<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
    <oval:product_name>The OVAL Repository</oval:product_name>
    <oval:schema_version>5.3</oval:schema_version>
    <oval:timestamp>2015-09-03T06:12:44.508-04:00</oval:timestamp>
  </generator>
  <definitions>
    <definition id="oval:org.mitre.oval:def:9997" version="5" class="vulnerability">
      <metadata>
        <title>The (1) Mozilla 1.6, (2) Firebird 0.7, (3) Firefox 0.8, and (4) Netscape 7.1 web browsers do not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0718"/>
        <description>The (1) Mozilla 1.6, (2) Firebird 0.7, (3) Firefox 0.8, and (4) Netscape 7.1 web browsers do not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:21.181-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:27.199-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:36.215-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9997 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:50.342-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:24:00.946-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9996" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798"/>
        <description>Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:10.334-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:26.770-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:35.766-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9996 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:02.908-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:24:00.367-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:33627"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:34238"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:34171"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:33767"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:34147"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34640"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34202"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34749"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34767"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34660"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34728"/>
            <criterion comment="krb5 is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34350"/>
            <criterion comment="krb5-libs is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34575"/>
            <criterion comment="krb5-server is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34729"/>
            <criterion comment="krb5-devel is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34195"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9995" version="5" class="vulnerability">
      <metadata>
        <title>The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys.  NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processers in a security-relevant fashion that was not addressed by the kernels.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056"/>
        <description>The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys.  NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processers in a security-relevant fashion that was not addressed by the kernels.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:25:05.980-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:26.348-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:35.189-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9995 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:25.620-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:59.785-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32158"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32589"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32704"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32562"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32078"/>
            <criterion comment="kernel is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32513"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32231"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32097"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32708"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32335"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32833"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32825"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32836"/>
            <criterion comment="kernel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32736"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:31931"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32361"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32793"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32795"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9994" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2210"/>
        <description>Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:16.910-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:25.828-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:34.694-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9994 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:07.247-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:59.144-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38621"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38710"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38897"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38330"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38382"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38913"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38781"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38614"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38727"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.39.el3" test_ref="oval:org.mitre.oval:tst:38447"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-44.el4_8" test_ref="oval:org.mitre.oval:tst:38465"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-44.el4_8" test_ref="oval:org.mitre.oval:tst:38839"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-23.el4" test_ref="oval:org.mitre.oval:tst:38562"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-44.el4_8" test_ref="oval:org.mitre.oval:tst:38248"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-44.el4_8" test_ref="oval:org.mitre.oval:tst:38879"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-44.el4_8" test_ref="oval:org.mitre.oval:tst:38157"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-44.el4_8" test_ref="oval:org.mitre.oval:tst:38757"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="thunderbird is earlier than 0:2.0.0.22-2.el5_3" test_ref="oval:org.mitre.oval:tst:38801"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9992" version="5" class="vulnerability">
      <metadata>
        <title>Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626"/>
        <description>Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:48.624-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:25.147-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:33.964-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9992 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:00.441-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:58.162-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32436"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32311"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32279"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.36" test_ref="oval:org.mitre.oval:tst:32437"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32507"/>
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.36" test_ref="oval:org.mitre.oval:tst:32206"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32377"/>
            <criterion comment="xpdf is earlier than 1:2.02-9.8" test_ref="oval:org.mitre.oval:tst:31474"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:31613"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.36" test_ref="oval:org.mitre.oval:tst:31553"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32260"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:32395"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32095"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:31805"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32489"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.10" test_ref="oval:org.mitre.oval:tst:32284"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32199"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.4" test_ref="oval:org.mitre.oval:tst:32545"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.10" test_ref="oval:org.mitre.oval:tst:32254"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32308"/>
            <criterion comment="xpdf is earlier than 1:3.00-11.10" test_ref="oval:org.mitre.oval:tst:32152"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32333"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32317"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.10" test_ref="oval:org.mitre.oval:tst:32499"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9991" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102"/>
        <description>Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:44.536-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:24.308-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:33.178-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9991 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:27.363-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:57.195-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33279"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33033"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33135"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32975"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33134"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32756"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33026"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33238"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33343"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32868"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32574"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33217"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33260"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33106"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33262"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33329"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32993"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33159"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33053"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33163"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33308"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32484"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33294"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33176"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32802"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32909"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33270"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33234"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33180"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32796"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33158"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33322"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33297"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33211"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33206"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33346"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33222"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33340"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33228"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33187"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33289"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33242"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33068"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33283"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33337"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:32984"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33352"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33122"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9989" version="5" class="vulnerability">
      <metadata>
        <title>The print_attr_string function in print-radius.c for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a RADIUS attribute with a large length value.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0055"/>
        <description>The print_attr_string function in print-radius.c for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a RADIUS attribute with a large length value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:59.777-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:23.584-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:32.436-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9989 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:28.764-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:56.229-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="libpcap is earlier than 14:0.7.2-7.E3.1" test_ref="oval:org.mitre.oval:tst:30562"/>
          <criterion comment="tcpdump is earlier than 14:3.7.2-7.E3.1" test_ref="oval:org.mitre.oval:tst:30488"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9988" version="5" class="vulnerability">
      <metadata>
        <title>Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6142"/>
        <description>Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:40.683-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:23.364-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:32.209-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9988 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:17.179-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:55.853-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-4.el3" test_ref="oval:org.mitre.oval:tst:32449"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-4.el4" test_ref="oval:org.mitre.oval:tst:33384"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9986" version="5" class="vulnerability">
      <metadata>
        <title>Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2177"/>
        <description>Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:35.807-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:22.617-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:31.507-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9986 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:18.285-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:54.593-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31395"/>
            <criterion comment="net-snmp is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:30763"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31684"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31547"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31390"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31408"/>
            <criterion comment="net-snmp is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:30993"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31414"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31691"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31766"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9985" version="5" class="vulnerability">
      <metadata>
        <title>RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2223"/>
        <description>RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:42.350-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:22.376-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:31.248-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9985 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:53.367-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:54.226-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="quagga is earlier than 0:0.96.2-11.3E" test_ref="oval:org.mitre.oval:tst:32541"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="quagga-devel is earlier than 0:0.98.3-2.4E" test_ref="oval:org.mitre.oval:tst:32744"/>
            <criterion comment="quagga is earlier than 0:0.98.3-2.4E" test_ref="oval:org.mitre.oval:tst:32471"/>
            <criterion comment="quagga-contrib is earlier than 0:0.98.3-2.4E" test_ref="oval:org.mitre.oval:tst:32544"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9984" version="5" class="vulnerability">
      <metadata>
        <title>The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108"/>
        <description>The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:59.428-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:21.994-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:30.859-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9984 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:57.379-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:53.657-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.24" test_ref="oval:org.mitre.oval:tst:35001"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.24" test_ref="oval:org.mitre.oval:tst:34962"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-33.24" test_ref="oval:org.mitre.oval:tst:34324"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-43.17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35545"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-43.17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35457"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-43.17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35580"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.8b-8.3.el5_0.2" test_ref="oval:org.mitre.oval:tst:35181"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.8b-8.3.el5_0.2" test_ref="oval:org.mitre.oval:tst:35460"/>
            <criterion comment="openssl is earlier than 0:0.9.8b-8.3.el5_0.2" test_ref="oval:org.mitre.oval:tst:35053"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9983" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Ruby before 1.8.5 allow remote attackers to bypass "safe level" checks via unspecified vectors involving (1) the alias function and (2) "directory operations".</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3694"/>
        <description>Multiple unspecified vulnerabilities in Ruby before 1.8.5 allow remote attackers to bypass "safe level" checks via unspecified vectors involving (1) the alias function and (2) "directory operations".</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:34.640-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:21.628-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:30.476-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9983 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:29:56.841-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:53.165-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.6.8-9.EL3.6" test_ref="oval:org.mitre.oval:tst:32443"/>
            <criterion comment="ruby-docs is earlier than 0:1.6.8-9.EL3.6" test_ref="oval:org.mitre.oval:tst:32730"/>
            <criterion comment="ruby-devel is earlier than 0:1.6.8-9.EL3.6" test_ref="oval:org.mitre.oval:tst:32800"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.6.8-9.EL3.6" test_ref="oval:org.mitre.oval:tst:32566"/>
            <criterion comment="ruby is earlier than 0:1.6.8-9.EL3.6" test_ref="oval:org.mitre.oval:tst:32264"/>
            <criterion comment="irb is earlier than 0:1.6.8-9.EL3.6" test_ref="oval:org.mitre.oval:tst:32482"/>
            <criterion comment="ruby-libs is earlier than 0:1.6.8-9.EL3.6" test_ref="oval:org.mitre.oval:tst:32617"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.8.1-7.EL4.6" test_ref="oval:org.mitre.oval:tst:32600"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.1-7.EL4.6" test_ref="oval:org.mitre.oval:tst:32723"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.1-7.EL4.6" test_ref="oval:org.mitre.oval:tst:32881"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.1-7.EL4.6" test_ref="oval:org.mitre.oval:tst:32751"/>
            <criterion comment="ruby is earlier than 0:1.8.1-7.EL4.6" test_ref="oval:org.mitre.oval:tst:32913"/>
            <criterion comment="irb is earlier than 0:1.8.1-7.EL4.6" test_ref="oval:org.mitre.oval:tst:32117"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.1-7.EL4.6" test_ref="oval:org.mitre.oval:tst:32804"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9982" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to "missing sanity checks around exif processing."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3292"/>
        <description>Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to "missing sanity checks around exif processing."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:28.890-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:20.856-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:29.709-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9982 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:49.081-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:52.117-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39717"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39629"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39915"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39741"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:40003"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39901"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39326"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39580"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:40010"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39927"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39619"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39111"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39417"/>
            <criterion comment="php is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39899"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39642"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39821"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39461"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39627"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39886"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39848"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39908"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39883"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39544"/>
            <criterion comment="php-common is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39804"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39875"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39748"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39802"/>
            <criterion comment="php is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39053"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39854"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39980"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39581"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39954"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39018"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39463"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39634"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39436"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39969"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39664"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39913"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39765"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9981" version="6" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the extract_one function from lhext.c in LHA may allow attackers to execute arbitrary code via a long w (working directory) command line option, a different issue than CVE-2004-0769. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0694"/>
        <description>Buffer overflow in LHA 1.14 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to "command line processing," a different vulnerability than CVE-2004-0771.  NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:20.278-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:20.668-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:29.511-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9981 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:14.740-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:51.808-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="lha is earlier than 0:1.14i-10.4" test_ref="oval:org.mitre.oval:tst:29793"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9979" version="5" class="vulnerability">
      <metadata>
        <title>Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352"/>
        <description>Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:15.192-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:19.616-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:28.532-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9979 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:46.216-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:50.604-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 0:2.02-11.el3" test_ref="oval:org.mitre.oval:tst:35634"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:34998"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-6.el4_5" test_ref="oval:org.mitre.oval:tst:35446"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35156"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-6.el4_5" test_ref="oval:org.mitre.oval:tst:35404"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35455"/>
            <criterion comment="cups-libs is earlier than 0:1.1.22-0.rc1.9.20.2.el4_5.2" test_ref="oval:org.mitre.oval:tst:35415"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35178"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.1" test_ref="oval:org.mitre.oval:tst:35574"/>
            <criterion comment="cups-devel is earlier than 0:1.1.22-0.rc1.9.20.2.el4_5.2" test_ref="oval:org.mitre.oval:tst:34735"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35585"/>
            <criterion comment="xpdf is earlier than 1:3.00-14.el4" test_ref="oval:org.mitre.oval:tst:35315"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35591"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35283"/>
            <criterion comment="cups is earlier than 0:1.1.22-0.rc1.9.20.2.el4_5.2" test_ref="oval:org.mitre.oval:tst:35537"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35498"/>
            <criterion comment="cups-lpd is earlier than 0:1.2.4-11.14.el5_1.3" test_ref="oval:org.mitre.oval:tst:35274"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35509"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.3.el5_1" test_ref="oval:org.mitre.oval:tst:35147"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.3.el5_1" test_ref="oval:org.mitre.oval:tst:35549"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35527"/>
            <criterion comment="cups-libs is earlier than 0:1.2.4-11.14.el5_1.3" test_ref="oval:org.mitre.oval:tst:35427"/>
            <criterion comment="tetex is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35459"/>
            <criterion comment="cups-devel is earlier than 0:1.2.4-11.14.el5_1.3" test_ref="oval:org.mitre.oval:tst:35508"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35407"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:34618"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:34727"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.3.el5_1" test_ref="oval:org.mitre.oval:tst:35496"/>
            <criterion comment="cups is earlier than 0:1.2.4-11.14.el5_1.3" test_ref="oval:org.mitre.oval:tst:35530"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9978" version="5" class="vulnerability">
      <metadata>
        <title>Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment.  NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071"/>
        <description>Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment.  NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:57.150-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:19.204-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:28.103-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9978 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:27.461-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:50.053-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33074"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32633"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33103"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33001"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32937"/>
            <criterion comment="kernel is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32280"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33127"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32855"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33021"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-42.0.3.EL" test_ref="oval:org.mitre.oval:tst:32678"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-42.0.3.EL" test_ref="oval:org.mitre.oval:tst:32900"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-42.0.3.EL" test_ref="oval:org.mitre.oval:tst:33014"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-42.0.3.EL" test_ref="oval:org.mitre.oval:tst:32947"/>
            <criterion comment="kernel is earlier than 0:2.6.9-42.0.3.EL" test_ref="oval:org.mitre.oval:tst:32944"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-42.0.3.EL" test_ref="oval:org.mitre.oval:tst:32956"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-42.0.3.EL" test_ref="oval:org.mitre.oval:tst:32602"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-42.0.3.EL" test_ref="oval:org.mitre.oval:tst:33081"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-42.0.3.EL" test_ref="oval:org.mitre.oval:tst:32892"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9976" version="5" class="vulnerability">
      <metadata>
        <title>Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1519"/>
        <description>Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:57.423-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:18.667-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:27.542-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9976 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:00.766-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:49.312-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.13" test_ref="oval:org.mitre.oval:tst:31246"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.9" test_ref="oval:org.mitre.oval:tst:31854"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9975" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in Unzip 5.52 allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by Unzip after the decompression is complete.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2475"/>
        <description>Race condition in Unzip 5.52 allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by Unzip after the decompression is complete.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:39.402-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:18.451-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:27.314-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9975 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:56.442-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:48.927-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="unzip is earlier than 0:5.50-35.EL3" test_ref="oval:org.mitre.oval:tst:30464"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="unzip is earlier than 0:5.51-9.EL4.5" test_ref="oval:org.mitre.oval:tst:33619"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9972" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592"/>
        <description>Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:01.426-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:17.359-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:26.170-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9972 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:24.332-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:47.293-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36256"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36236"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35996"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36279"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36046"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36052"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36034"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36284"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35748"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35994"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36164"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36050"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-8.el4" test_ref="oval:org.mitre.oval:tst:36202"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36193"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36093"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36053"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.10.el4" test_ref="oval:org.mitre.oval:tst:35919"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35600"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36141"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35397"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36203"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:36281"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:35480"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-8.el5" test_ref="oval:org.mitre.oval:tst:35675"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9971" version="5" class="vulnerability">
      <metadata>
        <title>TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via ISAKMP packets containing a Delete payload with a large number of SPI's, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0183"/>
        <description>TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via ISAKMP packets containing a Delete payload with a large number of SPI's, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:17.472-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:17.165-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:25.906-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9971 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:29:52.319-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:46.985-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="libpcap is earlier than 14:0.7.2-7.E3.2" test_ref="oval:org.mitre.oval:tst:30722"/>
          <criterion comment="tcpdump is earlier than 14:3.7.2-7.E3.2" test_ref="oval:org.mitre.oval:tst:29722"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9970" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unknown dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (assert error) via an invalid protocol tree item length.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1460"/>
        <description>Multiple unknown dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (assert error) via an invalid protocol tree item length.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:29.604-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:16.878-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:25.648-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9970 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:05.931-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:46.615-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:997" version="4" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise Linux 3 Kernel Serial Link Information Disclosure Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0461"/>
        <description>/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-12T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-16T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:45.280-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:12.394-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:obj:927 - Removed unneeded negate=&quot;false&quot; and added &quot;xsi:nil='true'&quot; to filenames to indicate directory is the file object, not the files in the directory." date="2012-04-04T14:37:00.449-04:00">
              <contributor organization="Symantec Corporation">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2012-04-04T14:40:09.247-04:00">INTERIM</status_change>
            <status_change date="2012-04-23T04:00:24.894-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="kernel version is less than 2.4.21-15.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1342"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/proc/tty/driver/serial is world-readable" negate="false" test_ref="oval:org.mitre.oval:tst:1341"/>
          <criterion comment="/proc/tty/driver/ is world-executable" negate="false" test_ref="oval:org.mitre.oval:tst:1340"/>
          <criterion comment="/proc/tty/ is world-executable" negate="false" test_ref="oval:org.mitre.oval:tst:1339"/>
          <criterion comment="/proc/ is world-executable" negate="false" test_ref="oval:org.mitre.oval:tst:1338"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9969" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882"/>
        <description>Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:23.576-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:16.660-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:25.410-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9969 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:50.318-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:46.319-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="samba-common is earlier than 0:3.0.7-1.3E.1" test_ref="oval:org.mitre.oval:tst:30820"/>
          <criterion comment="samba-swat is earlier than 0:3.0.7-1.3E.1" test_ref="oval:org.mitre.oval:tst:31128"/>
          <criterion comment="samba-client is earlier than 0:3.0.7-1.3E.1" test_ref="oval:org.mitre.oval:tst:31144"/>
          <criterion comment="samba is earlier than 0:3.0.7-1.3E.1" test_ref="oval:org.mitre.oval:tst:31136"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9968" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the WriteProlog function in texttops in CUPS 1.1.17 on Red Hat Enterprise Linux (RHEL) 3 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2008-3640.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0577"/>
        <description>Integer overflow in the WriteProlog function in texttops in CUPS 1.1.17 on Red Hat Enterprise Linux (RHEL) 3 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2008-3640.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:23.235-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:16.457-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:25.062-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9968 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:12.213-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:45.983-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.56" test_ref="oval:org.mitre.oval:tst:37836"/>
          <criterion comment="cups is earlier than 1:1.1.17-13.3.56" test_ref="oval:org.mitre.oval:tst:38122"/>
          <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.56" test_ref="oval:org.mitre.oval:tst:38220"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9967" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2834"/>
        <description>Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:04.925-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:14.306-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:22.938-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9967 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:08.581-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:43.715-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-40.2.0.EL3" test_ref="oval:org.mitre.oval:tst:34967"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-40.2.0.EL3" test_ref="oval:org.mitre.oval:tst:34907"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-40.2.0.EL3" test_ref="oval:org.mitre.oval:tst:34663"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org2-langpack-lt_LT is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34624"/>
            <criterion comment="openoffice.org2-langpack-nn_NO is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34985"/>
            <criterion comment="openoffice.org2-langpack-ga_IE is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34600"/>
            <criterion comment="openoffice.org2-langpack-zh_CN is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35058"/>
            <criterion comment="openoffice.org2-javafilter is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34840"/>
            <criterion comment="openoffice.org2-langpack-he_IL is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34776"/>
            <criterion comment="openoffice.org2-draw is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34590"/>
            <criterion comment="openoffice.org2-langpack-ko_KR is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35090"/>
            <criterion comment="openoffice.org2-langpack-ca_ES is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35105"/>
            <criterion comment="openoffice.org2-base is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34685"/>
            <criterion comment="openoffice.org2-langpack-fr is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34233"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.5-10.6.0.2.EL4" test_ref="oval:org.mitre.oval:tst:34999"/>
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.5-10.6.0.2.EL4" test_ref="oval:org.mitre.oval:tst:34898"/>
            <criterion comment="openoffice.org2-langpack-pa_IN is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35138"/>
            <criterion comment="openoffice.org2-langpack-da_DK is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34744"/>
            <criterion comment="openoffice.org2-emailmerge is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34838"/>
            <criterion comment="openoffice.org2-langpack-pt_PT is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34903"/>
            <criterion comment="openoffice.org2-langpack-es is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34783"/>
            <criterion comment="openoffice.org2-langpack-sv is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35127"/>
            <criterion comment="openoffice.org2-langpack-ms_MY is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35036"/>
            <criterion comment="openoffice.org2-langpack-cs_CZ is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35135"/>
            <criterion comment="openoffice.org2-xsltfilter is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35130"/>
            <criterion comment="openoffice.org2-langpack-ja_JP is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34854"/>
            <criterion comment="openoffice.org2-langpack-hu_HU is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34867"/>
            <criterion comment="openoffice.org2-langpack-zh_TW is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35190"/>
            <criterion comment="openoffice.org2-langpack-sl_SI is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34239"/>
            <criterion comment="openoffice.org2-langpack-de is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34269"/>
            <criterion comment="openoffice.org2-pyuno is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35163"/>
            <criterion comment="openoffice.org2 is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34429"/>
            <criterion comment="openoffice.org2-langpack-tr_TR is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34318"/>
            <criterion comment="openoffice.org2-impress is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34522"/>
            <criterion comment="openoffice.org2-langpack-bn is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34715"/>
            <criterion comment="openoffice.org2-langpack-ar is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34987"/>
            <criterion comment="openoffice.org2-langpack-pt_BR is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35152"/>
            <criterion comment="openoffice.org2-langpack-af_ZA is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34733"/>
            <criterion comment="openoffice.org2-langpack-pl_PL is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34947"/>
            <criterion comment="openoffice.org2-calc is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34830"/>
            <criterion comment="openoffice.org2-langpack-zu_ZA is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35107"/>
            <criterion comment="openoffice.org2-langpack-fi_FI is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34895"/>
            <criterion comment="openoffice.org2-langpack-sk_SK is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34353"/>
            <criterion comment="openoffice.org2-langpack-hi_IN is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35096"/>
            <criterion comment="openoffice.org2-langpack-nb_NO is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34629"/>
            <criterion comment="openoffice.org2-langpack-th_TH is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35089"/>
            <criterion comment="openoffice.org2-langpack-et_EE is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34887"/>
            <criterion comment="openoffice.org2-langpack-gl_ES is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34939"/>
            <criterion comment="openoffice.org2-langpack-it is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34988"/>
            <criterion comment="openoffice.org2-langpack-hr_HR is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34591"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.5-10.6.0.2.EL4" test_ref="oval:org.mitre.oval:tst:34737"/>
            <criterion comment="openoffice.org2-langpack-ta_IN is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34412"/>
            <criterion comment="openoffice.org2-langpack-gu_IN is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34871"/>
            <criterion comment="openoffice.org2-testtools is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34717"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.5-10.6.0.2.EL4" test_ref="oval:org.mitre.oval:tst:34942"/>
            <criterion comment="openoffice.org2-langpack-eu_ES is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35019"/>
            <criterion comment="openoffice.org2-langpack-el_GR is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34969"/>
            <criterion comment="openoffice.org2-core is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35129"/>
            <criterion comment="openoffice.org2-langpack-ru is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34980"/>
            <criterion comment="openoffice.org2-langpack-bg_BG is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34548"/>
            <criterion comment="openoffice.org2-langpack-nl is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35098"/>
            <criterion comment="openoffice.org2-langpack-sr_CS is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34983"/>
            <criterion comment="openoffice.org2-langpack-cy_GB is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34904"/>
            <criterion comment="openoffice.org2-math is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35206"/>
            <criterion comment="openoffice.org2-graphicfilter is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:34571"/>
            <criterion comment="openoffice.org2-writer is earlier than 1:2.0.4-5.7.0.2.0" test_ref="oval:org.mitre.oval:tst:35205"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-langpack-sk_SK is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35157"/>
            <criterion comment="openoffice.org-langpack-zu_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35006"/>
            <criterion comment="openoffice.org-langpack-pa_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34919"/>
            <criterion comment="openoffice.org-langpack-hi_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35196"/>
            <criterion comment="openoffice.org-langpack-et_EE is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35104"/>
            <criterion comment="openoffice.org-langpack-kn_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34449"/>
            <criterion comment="openoffice.org is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34768"/>
            <criterion comment="openoffice.org-langpack-zh_TW is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35222"/>
            <criterion comment="openoffice.org-writer is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35111"/>
            <criterion comment="openoffice.org-langpack-ve_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35231"/>
            <criterion comment="openoffice.org-langpack-ga_IE is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35237"/>
            <criterion comment="openoffice.org-langpack-ta_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34488"/>
            <criterion comment="openoffice.org-langpack-ko_KR is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34457"/>
            <criterion comment="openoffice.org-langpack-or_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35232"/>
            <criterion comment="openoffice.org-langpack-da_DK is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35235"/>
            <criterion comment="openoffice.org-langpack-sr_CS is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35194"/>
            <criterion comment="openoffice.org-langpack-pl_PL is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34862"/>
            <criterion comment="openoffice.org-langpack-fr is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34938"/>
            <criterion comment="openoffice.org-langpack-ts_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34706"/>
            <criterion comment="openoffice.org-javafilter is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34766"/>
            <criterion comment="openoffice.org-langpack-as_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35172"/>
            <criterion comment="openoffice.org-testtools is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34709"/>
            <criterion comment="openoffice.org-langpack-hr_HR is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35079"/>
            <criterion comment="openoffice.org-langpack-de is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35080"/>
            <criterion comment="openoffice.org-emailmerge is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34726"/>
            <criterion comment="openoffice.org-xsltfilter is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34972"/>
            <criterion comment="openoffice.org-langpack-tn_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35101"/>
            <criterion comment="openoffice.org-langpack-te_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34674"/>
            <criterion comment="openoffice.org-langpack-sv is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35094"/>
            <criterion comment="openoffice.org-base is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35137"/>
            <criterion comment="openoffice.org-langpack-ca_ES is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34909"/>
            <criterion comment="openoffice.org-langpack-nr_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35201"/>
            <criterion comment="openoffice.org-core is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34989"/>
            <criterion comment="openoffice.org-langpack-nl is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35225"/>
            <criterion comment="openoffice.org-langpack-ur is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34978"/>
            <criterion comment="openoffice.org-langpack-nn_NO is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35038"/>
            <criterion comment="openoffice.org-langpack-ar is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35198"/>
            <criterion comment="openoffice.org-langpack-ja_JP is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34866"/>
            <criterion comment="openoffice.org-langpack-gu_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34918"/>
            <criterion comment="openoffice.org-langpack-tr_TR is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34874"/>
            <criterion comment="openoffice.org-langpack-eu_ES is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35203"/>
            <criterion comment="openoffice.org-langpack-fi_FI is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35211"/>
            <criterion comment="openoffice.org-graphicfilter is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34963"/>
            <criterion comment="openoffice.org-pyuno is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34932"/>
            <criterion comment="openoffice.org-langpack-ml_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35151"/>
            <criterion comment="openoffice.org-langpack-gl_ES is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34242"/>
            <criterion comment="openoffice.org-langpack-zh_CN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35217"/>
            <criterion comment="openoffice.org-langpack-xh_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35027"/>
            <criterion comment="openoffice.org-langpack-it is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34687"/>
            <criterion comment="openoffice.org-langpack-es is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34666"/>
            <criterion comment="openoffice.org-langpack-nb_NO is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34639"/>
            <criterion comment="openoffice.org-langpack-sl_SI is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34834"/>
            <criterion comment="openoffice.org-draw is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35238"/>
            <criterion comment="openoffice.org-langpack-nso_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35072"/>
            <criterion comment="openoffice.org-langpack-ms_MY is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35082"/>
            <criterion comment="openoffice.org-langpack-el_GR is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34878"/>
            <criterion comment="openoffice.org-langpack-hu_HU is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34330"/>
            <criterion comment="openoffice.org-langpack-ss_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35063"/>
            <criterion comment="openoffice.org-langpack-bn is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34592"/>
            <criterion comment="openoffice.org-langpack-he_IL is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35109"/>
            <criterion comment="openoffice.org-langpack-pt_PT is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34705"/>
            <criterion comment="openoffice.org-langpack-lt_LT is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34515"/>
            <criterion comment="openoffice.org-langpack-af_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34792"/>
            <criterion comment="openoffice.org-langpack-bg_BG is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35068"/>
            <criterion comment="openoffice.org-calc is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35132"/>
            <criterion comment="openoffice.org-langpack-cs_CZ is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35188"/>
            <criterion comment="openoffice.org-langpack-cy_GB is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35128"/>
            <criterion comment="openoffice.org-langpack-mr_IN is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34875"/>
            <criterion comment="openoffice.org-langpack-th_TH is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34788"/>
            <criterion comment="openoffice.org-langpack-pt_BR is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35158"/>
            <criterion comment="openoffice.org-langpack-ru is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34970"/>
            <criterion comment="openoffice.org-math is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34996"/>
            <criterion comment="openoffice.org-impress is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:34349"/>
            <criterion comment="openoffice.org-langpack-st_ZA is earlier than 1:2.0.4-5.4.17.3" test_ref="oval:org.mitre.oval:tst:35193"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9966" version="5" class="vulnerability">
      <metadata>
        <title>HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786"/>
        <description>HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:22.234-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:13.731-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:22.390-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9966 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:04.477-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:42.997-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32575"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32674"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32919"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32864"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32659"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32859"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32902"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32837"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9965" version="5" class="vulnerability">
      <metadata>
        <title>Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0415"/>
        <description>Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:55.371-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:13.448-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:22.093-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9965 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:36.637-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:42.638-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30827"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30622"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30627"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30676"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30823"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30750"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30596"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30833"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30830"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9964" version="5" class="vulnerability">
      <metadata>
        <title>Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389"/>
        <description>Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:24.387-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:13.136-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:21.723-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9964 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:32.583-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:41.933-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.6-EL4.1" test_ref="oval:org.mitre.oval:tst:34755"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.6-EL4.1" test_ref="oval:org.mitre.oval:tst:34881"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.6-1.el5" test_ref="oval:org.mitre.oval:tst:34336"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.6-1.el5" test_ref="oval:org.mitre.oval:tst:34784"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9963" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in ImageMagick before 6.3.5-9 allow context-dependent attackers to execute arbitrary code via a crafted (1) .dcm, (2) .dib, (3) .xbm, (4) .xcf, or (5) .xwd image file, which triggers a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986"/>
        <description>Multiple integer overflows in ImageMagick before 6.3.5-9 allow context-dependent attackers to execute arbitrary code via a crafted (1) .dcm, (2) .dib, (3) .xbm, (4) .xcf, or (5) .xwd image file, which triggers a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:14.834-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:12.686-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:21.299-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9963 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:13.686-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:41.345-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36023"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36184"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36260"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36208"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36056"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36311"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36459"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36349"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35927"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36106"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36419"/>
            <criterion comment="ImageMagick is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36360"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36388"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:35921"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36133"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9962" version="5" class="vulnerability">
      <metadata>
        <title>scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225"/>
        <description>scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:20.355-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:12.374-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:20.913-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9962 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:20.268-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:40.838-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssh is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32634"/>
            <criterion comment="openssh-askpass is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32130"/>
            <criterion comment="openssh-server is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32453"/>
            <criterion comment="openssh-clients is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32516"/>
            <criterion comment="openssh-askpass-gnome is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32587"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssh is earlier than 0:3.9p1-8.RHEL4.12" test_ref="oval:org.mitre.oval:tst:32475"/>
            <criterion comment="openssh-askpass is earlier than 0:3.9p1-8.RHEL4.12" test_ref="oval:org.mitre.oval:tst:32414"/>
            <criterion comment="openssh-server is earlier than 0:3.9p1-8.RHEL4.12" test_ref="oval:org.mitre.oval:tst:32296"/>
            <criterion comment="openssh-clients is earlier than 0:3.9p1-8.RHEL4.12" test_ref="oval:org.mitre.oval:tst:32306"/>
            <criterion comment="openssh-askpass-gnome is earlier than 0:3.9p1-8.RHEL4.12" test_ref="oval:org.mitre.oval:tst:32251"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9961" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to replace existing search plugins with malicious ones using sidebar.addSearchEngine and the same filename as the target engine, which may not be displayed in the GUI, which could then be used to execute malicious script, aka "Firesearching 2."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1157"/>
        <description>Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to replace existing search plugins with malicious ones using sidebar.addSearchEngine and the same filename as the target engine, which may not be displayed in the GUI, which could then be used to execute malicious script, aka "Firesearching 2."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:17.084-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:11.827-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:20.344-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9961 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:17.007-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:40.226-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31478"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31488"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31751"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31647"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30850"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31749"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31658"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31636"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31780"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30828"/>
            <criterion comment="firefox is earlier than 0:1.0.3-1.4.1" test_ref="oval:org.mitre.oval:tst:31646"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31716"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31758"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9959" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726"/>
        <description>Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:56.212-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:10.933-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:19.416-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9959 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:24.426-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:38.991-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:36968"/>
            <criterion comment="ruby-docs is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37000"/>
            <criterion comment="ruby-devel is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:36747"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37140"/>
            <criterion comment="ruby is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37342"/>
            <criterion comment="irb is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37252"/>
            <criterion comment="ruby-libs is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37305"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37171"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37242"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36569"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37296"/>
            <criterion comment="ruby is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36468"/>
            <criterion comment="irb is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36808"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37219"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-ri is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37199"/>
            <criterion comment="ruby-mode is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36604"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36516"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36870"/>
            <criterion comment="ruby is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36738"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37119"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37289"/>
            <criterion comment="ruby-irb is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37148"/>
            <criterion comment="ruby-rdoc is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37203"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9958" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412"/>
        <description>Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:27.599-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:10.553-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:18.965-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9958 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:46.310-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:38.426-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-75.ent" test_ref="oval:org.mitre.oval:tst:39033"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-75.ent" test_ref="oval:org.mitre.oval:tst:38392"/>
            <criterion comment="httpd is earlier than 0:2.0.46-75.ent" test_ref="oval:org.mitre.oval:tst:39071"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="apr-devel is earlier than 0:0.9.4-24.9.el4_8.2" test_ref="oval:org.mitre.oval:tst:38759"/>
            <criterion comment="apr-util-devel is earlier than 0:0.9.4-22.el4_8.2" test_ref="oval:org.mitre.oval:tst:39047"/>
            <criterion comment="apr is earlier than 0:0.9.4-24.9.el4_8.2" test_ref="oval:org.mitre.oval:tst:39098"/>
            <criterion comment="apr-util is earlier than 0:0.9.4-22.el4_8.2" test_ref="oval:org.mitre.oval:tst:38182"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="apr-docs is earlier than 0:1.2.7-11.el5_3.1" test_ref="oval:org.mitre.oval:tst:38932"/>
            <criterion comment="apr-devel is earlier than 0:1.2.7-11.el5_3.1" test_ref="oval:org.mitre.oval:tst:39149"/>
            <criterion comment="apr-util-docs is earlier than 0:1.2.7-7.el5_3.2" test_ref="oval:org.mitre.oval:tst:38625"/>
            <criterion comment="apr-util-devel is earlier than 0:1.2.7-7.el5_3.2" test_ref="oval:org.mitre.oval:tst:38971"/>
            <criterion comment="apr is earlier than 0:1.2.7-11.el5_3.1" test_ref="oval:org.mitre.oval:tst:39108"/>
            <criterion comment="apr-util is earlier than 0:1.2.7-7.el5_3.2" test_ref="oval:org.mitre.oval:tst:38986"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9955" version="5" class="vulnerability">
      <metadata>
        <title>ACPI Event Daemon (acpid) before 1.0.10 allows remote attackers to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798"/>
        <description>ACPI Event Daemon (acpid) before 1.0.10 allows remote attackers to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:07.606-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:09.628-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:18.107-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9955 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:45.300-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:37.116-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="acpid is earlier than 0:1.0.2-4" test_ref="oval:org.mitre.oval:tst:38604"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="acpid is earlier than 0:1.0.3-2.el4_7.1" test_ref="oval:org.mitre.oval:tst:38456"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="acpid is earlier than 0:1.0.4-7.el5_3.1" test_ref="oval:org.mitre.oval:tst:38613"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9952" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990"/>
        <description>Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:40.553-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:08.647-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:17.085-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9952 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:20.355-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:35.760-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="gd is earlier than 0:1.8.4-12.3.1" test_ref="oval:org.mitre.oval:tst:31045"/>
          <criterion comment="gd-devel is earlier than 0:1.8.4-12.3.1" test_ref="oval:org.mitre.oval:tst:31109"/>
          <criterion comment="gd-progs is earlier than 0:1.8.4-12.3.1" test_ref="oval:org.mitre.oval:tst:31083"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9950" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, and SeaMonkey before 1.1.12, allow user-assisted remote attackers to move a window during a mouse click, and possibly force a file download or unspecified other drag-and-drop action, via a crafted onmousedown action that calls window.moveBy, a variant of CVE-2003-0823.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3837"/>
        <description>Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, and SeaMonkey before 1.1.12, allow user-assisted remote attackers to move a window during a mouse click, and possibly force a file download or unspecified other drag-and-drop action, via a crafted onmousedown action that calls window.moveBy, a variant of CVE-2003-0823.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:29.260-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:07.762-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:16.188-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9950 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:48.603-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:34.613-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el4" test_ref="oval:org.mitre.oval:tst:37195"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37248"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37486"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37495"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37044"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37578"/>
            <criterion comment="yelp is earlier than 0:2.16.0-21.el5" test_ref="oval:org.mitre.oval:tst:37584"/>
            <criterion comment="devhelp is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37353"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37406"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el5" test_ref="oval:org.mitre.oval:tst:37225"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:36664"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37664"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9948" version="5" class="vulnerability">
      <metadata>
        <title>The Vicam USB driver in Linux before 2.4.25 does not use the copy_from_user function when copying data from userspace to kernel space, which crosses security boundaries and allows local users to cause a denial of service.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0075"/>
        <description>The Vicam USB driver in Linux before 2.4.25 does not use the copy_from_user function when copying data from userspace to kernel space, which crosses security boundaries and allows local users to cause a denial of service.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:06.895-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:07.206-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:15.542-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9948 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:28.440-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:33.796-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31148"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31473"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31178"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31282"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31565"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31562"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31582"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:30730"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31534"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9947" version="5" class="vulnerability">
      <metadata>
        <title>PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the "\" (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of "Encoding-Based SQL Injection." NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314"/>
        <description>PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the "\" (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of "Encoding-Based SQL Injection." NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:08.780-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:06.674-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:14.907-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9947 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:36.218-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:33.201-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32465"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32618"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32497"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32527"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32392"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32719"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32621"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32195"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32628"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32601"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:31936"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32101"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31976"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32564"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32038"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32648"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31768"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32626"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31950"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32604"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32472"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32278"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9946" version="5" class="vulnerability">
      <metadata>
        <title>The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1918"/>
        <description>The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:37.137-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:06.478-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:14.706-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9946 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:50.109-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:32.875-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="tar is earlier than 0:1.13.25-14.RHEL3" test_ref="oval:org.mitre.oval:tst:31888"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9945" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in wiretap/erf.c in Wireshark before 1.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted erf file, related to an "unsigned integer wrap vulnerability."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829"/>
        <description>Integer overflow in wiretap/erf.c in Wireshark before 1.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted erf file, related to an "unsigned integer wrap vulnerability."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:03.438-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:06.192-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:14.403-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9945 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:19.338-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:32.395-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:39600"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:40430"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:40437"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:39877"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40351"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40208"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9944" version="5" class="vulnerability">
      <metadata>
        <title>smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906"/>
        <description>smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:02.322-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:05.773-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:13.964-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9944 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:33.158-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:31.679-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.9-1.3E.16" test_ref="oval:org.mitre.oval:tst:39355"/>
            <criterion comment="samba-swat is earlier than 0:3.0.9-1.3E.16" test_ref="oval:org.mitre.oval:tst:39369"/>
            <criterion comment="samba-client is earlier than 0:3.0.9-1.3E.16" test_ref="oval:org.mitre.oval:tst:39545"/>
            <criterion comment="samba is earlier than 0:3.0.9-1.3E.16" test_ref="oval:org.mitre.oval:tst:39475"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.33-0.18.el4_8" test_ref="oval:org.mitre.oval:tst:39162"/>
            <criterion comment="samba-swat is earlier than 0:3.0.33-0.18.el4_8" test_ref="oval:org.mitre.oval:tst:39589"/>
            <criterion comment="samba-client is earlier than 0:3.0.33-0.18.el4_8" test_ref="oval:org.mitre.oval:tst:39603"/>
            <criterion comment="samba is earlier than 0:3.0.33-0.18.el4_8" test_ref="oval:org.mitre.oval:tst:39658"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.33-3.15.el5_4" test_ref="oval:org.mitre.oval:tst:39633"/>
            <criterion comment="samba-swat is earlier than 0:3.0.33-3.15.el5_4" test_ref="oval:org.mitre.oval:tst:39222"/>
            <criterion comment="samba-client is earlier than 0:3.0.33-3.15.el5_4" test_ref="oval:org.mitre.oval:tst:39493"/>
            <criterion comment="samba is earlier than 0:3.0.33-3.15.el5_4" test_ref="oval:org.mitre.oval:tst:39205"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9943" version="5" class="vulnerability">
      <metadata>
        <title>Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFree86 and other packages, include (1) multiple integer overflows, (2) out-of-bounds memory accesses, (3) directory traversal, (4) shell metacharacter, (5) endless loops, and (6) memory leaks, which could allow remote attackers to obtain sensitive information, cause a denial of service (application crash), or execute arbitrary code via a certain XPM image file. NOTE: it is highly likely that this candidate will be SPLIT into other candidates in the future, per CVE's content decisions.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0914"/>
        <description>Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFree86 and other packages, include (1) multiple integer overflows, (2) out-of-bounds memory accesses, (3) directory traversal, (4) shell metacharacter, (5) endless loops, and (6) memory leaks, which could allow remote attackers to obtain sensitive information, cause a denial of service (application crash), or execute arbitrary code via a certain XPM image file. NOTE: it is highly likely that this candidate will be SPLIT into other candidates in the future, per CVE's content decisions.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:21.628-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:05.198-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:13.375-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9943 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:38.482-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:30.970-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30653"/>
          <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30795"/>
          <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:31038"/>
          <criterion comment="XFree86-libs is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30973"/>
          <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30713"/>
          <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30995"/>
          <criterion comment="XFree86-twm is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:31069"/>
          <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30155"/>
          <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:31142"/>
          <criterion comment="XFree86-doc is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:31107"/>
          <criterion comment="openmotif21 is earlier than 0:2.1.30-9.RHEL3.4" test_ref="oval:org.mitre.oval:tst:30867"/>
          <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30816"/>
          <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30980"/>
          <criterion comment="openmotif is earlier than 0:2.2.3-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:31105"/>
          <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30942"/>
          <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30994"/>
          <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30972"/>
          <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30197"/>
          <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30720"/>
          <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30777"/>
          <criterion comment="XFree86-xdm is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30811"/>
          <criterion comment="XFree86-sdk is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30529"/>
          <criterion comment="XFree86 is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:31025"/>
          <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30781"/>
          <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30607"/>
          <criterion comment="XFree86-xfs is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30885"/>
          <criterion comment="XFree86-tools is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30637"/>
          <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:31060"/>
          <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30699"/>
          <criterion comment="openmotif-devel is earlier than 0:2.2.3-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:30744"/>
          <criterion comment="XFree86-xauth is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30991"/>
          <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30327"/>
          <criterion comment="XFree86-devel is earlier than 0:4.3.0-78.EL" test_ref="oval:org.mitre.oval:tst:30499"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9941" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147"/>
        <description>Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:46.519-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:04.319-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:12.464-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9941 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:17.397-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:29.292-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 1:2.02-14.el3" test_ref="oval:org.mitre.oval:tst:38322"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38126"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38230"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38481"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_7.4" test_ref="oval:org.mitre.oval:tst:38436"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38145"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="xpdf is earlier than 1:3.00-20.el4" test_ref="oval:org.mitre.oval:tst:38649"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38607"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38618"/>
            <criterion comment="cups-lpd is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38471"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40312"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38271"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38760"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40122"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38541"/>
            <criterion comment="tetex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40413"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40398"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38500"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40444"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38512"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:37935"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40008"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:39920"/>
            <criterion comment="cups is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38334"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9940" version="5" class="vulnerability">
      <metadata>
        <title>CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass intended ACLs via a printer name containing uppercase or lowercase letters that are different from what is specified in the directive.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-2154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2154"/>
        <description>CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass intended ACLs via a printer name containing uppercase or lowercase letters that are different from what is specified in the directive.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:31.002-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:04.112-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:12.245-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9940 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:35.341-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:28.966-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.29" test_ref="oval:org.mitre.oval:tst:31955"/>
          <criterion comment="cups is earlier than 1:1.1.17-13.3.29" test_ref="oval:org.mitre.oval:tst:31393"/>
          <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.29" test_ref="oval:org.mitre.oval:tst:31828"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:994" version="1" class="vulnerability">
      <metadata>
        <title>CVS error_prog_name Double-free Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>CVS</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0416"/>
        <description>Double free vulnerability for the error_prog_name string in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-29T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-07-21T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-08-04T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="AND" comment="Software section">
          <criterion comment="Red Hat Enterprise 3 is installed" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="cvs rpm version prior to 1.11.2-24 is installed" test_ref="oval:org.mitre.oval:tst:1347"/>
        </criteria>
        <criteria operator="AND" comment="Configuration section">
          <criteria operator="OR" comment="/usr/bin/cvs is executable">
            <criterion comment="/usr/bin/cvs is executable" test_ref="oval:org.mitre.oval:tst:1381"/>
            <criterion comment="/usr/bin/cvs is executable" test_ref="oval:org.mitre.oval:tst:1380"/>
            <criterion comment="/usr/bin/cvs is executable" test_ref="oval:org.mitre.oval:tst:1379"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9939" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863"/>
        <description>Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:58.147-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:03.812-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:11.909-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9939 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:05.798-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:28.537-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="enscript is earlier than 0:1.6.1-24.7" test_ref="oval:org.mitre.oval:tst:37704"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="enscript is earlier than 0:1.6.1-33.el4_7.1" test_ref="oval:org.mitre.oval:tst:37804"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="enscript is earlier than 0:1.6.4-4.1.1.el5_2" test_ref="oval:org.mitre.oval:tst:38101"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9938" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0452"/>
        <description>Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:14.746-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:03.537-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:11.615-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9938 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:04.938-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:28.128-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="perl-suidperl is earlier than 2:5.8.0-89.10" test_ref="oval:org.mitre.oval:tst:31361"/>
            <criterion comment="perl is earlier than 2:5.8.0-89.10" test_ref="oval:org.mitre.oval:tst:30931"/>
            <criterion comment="perl-CPAN is earlier than 2:1.61-89.10" test_ref="oval:org.mitre.oval:tst:30901"/>
            <criterion comment="perl-CGI is earlier than 2:2.81-89.10" test_ref="oval:org.mitre.oval:tst:31227"/>
            <criterion comment="perl-DB_File is earlier than 2:1.804-89.10" test_ref="oval:org.mitre.oval:tst:30945"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="perl-suidperl is earlier than 3:5.8.5-12.1.1" test_ref="oval:org.mitre.oval:tst:31049"/>
            <criterion comment="perl is earlier than 3:5.8.5-12.1" test_ref="oval:org.mitre.oval:tst:31120"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9934" version="5" class="vulnerability">
      <metadata>
        <title>Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811"/>
        <description>Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:21.415-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:02.264-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:10.308-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9934 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:14:10.292-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:26.360-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32342"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32877"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:31982"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32816"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32080"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32904"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32915"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32822"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32555"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9933" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-0304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0304"/>
        <description>Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:24.618-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:01.902-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:09.964-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9933 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:11.168-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:25.852-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:39600"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:40430"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:40437"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:39877"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40351"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40208"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9931" version="5" class="vulnerability">
      <metadata>
        <title>The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0633"/>
        <description>The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:35.841-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:15:01.427-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:09.463-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9931 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:06.479-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:25.177-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.10.5-0.30E.2" test_ref="oval:org.mitre.oval:tst:29799"/>
          <criterion comment="ethereal is earlier than 0:0.10.5-0.30E.2" test_ref="oval:org.mitre.oval:tst:30522"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:993" version="1" class="vulnerability">
      <metadata>
        <title>CVS Improper Handling of Malformed Entry Lines</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>CVS</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0414"/>
        <description>CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle malformed "Entry" lines, which prevents a NULL terminator from being used and may lead to a denial of service (crash), modification of critical program data, or arbitrary code execution.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-29T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-07-21T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-08-04T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="cvs rpm version prior to 1.11.2-24 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:1347"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/bin/cvs is executable">
            <criterion comment="/usr/bin/cvs is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1381"/>
            <criterion comment="/usr/bin/cvs is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1380"/>
            <criterion comment="/usr/bin/cvs is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1379"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9926" version="5" class="vulnerability">
      <metadata>
        <title>The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180"/>
        <description>The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:48.604-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:59.474-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:07.543-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9926 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:18.008-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:22.733-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 1:2.02-14.el3" test_ref="oval:org.mitre.oval:tst:38322"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38126"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38230"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38481"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_7.4" test_ref="oval:org.mitre.oval:tst:38436"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38145"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="xpdf is earlier than 1:3.00-20.el4" test_ref="oval:org.mitre.oval:tst:38649"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38607"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38618"/>
            <criterion comment="cups-lpd is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38471"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40312"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38271"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38760"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40122"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38541"/>
            <criterion comment="tetex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40413"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40398"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38500"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40444"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38512"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:37935"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40008"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:39920"/>
            <criterion comment="cups is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38334"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9925" version="5" class="vulnerability">
      <metadata>
        <title>Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0005"/>
        <description>Heap-based buffer overflow in psd.c for ImageMagick 6.1.0, 6.1.7, and possibly earlier versions allows remote attackers to execute arbitrary code via a .PSD image file with a large number of layers.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:56.373-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:59.151-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:07.212-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9925 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:39.777-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:22.259-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30471"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30355"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30877"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30918"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30938"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-6" test_ref="oval:org.mitre.oval:tst:30872"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-6" test_ref="oval:org.mitre.oval:tst:31137"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-6" test_ref="oval:org.mitre.oval:tst:31139"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-6" test_ref="oval:org.mitre.oval:tst:31140"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-6" test_ref="oval:org.mitre.oval:tst:31337"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9924" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.1 and Mozilla before 1.7.6 truncates long sub-domains or paths for display, which may allow remote malicious web sites to spoof legitimate sites and facilitate phishing attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0585"/>
        <description>Firefox before 1.0.1 and Mozilla before 1.7.6 truncates long sub-domains or paths for display, which may allow remote malicious web sites to spoof legitimate sites and facilitate phishing attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:26.737-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:58.772-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:06.821-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9924 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:21.439-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:21.690-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="firefox is earlier than 0:1.0.1-1.4.3" test_ref="oval:org.mitre.oval:tst:31118"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9923" version="5" class="vulnerability">
      <metadata>
        <title>Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0372"/>
        <description>Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:07.106-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:58.549-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:06.592-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9923 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:35.821-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:21.321-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gftp is earlier than 1:2.0.14-4" test_ref="oval:org.mitre.oval:tst:31807"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gftp is earlier than 1:2.0.17-5" test_ref="oval:org.mitre.oval:tst:31775"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9920" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in Wireshark (formerly Ethereal) 0.99.6 through 1.0.2 allows attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3934"/>
        <description>Unspecified vulnerability in Wireshark (formerly Ethereal) 0.99.6 through 1.0.2 allows attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:56.398-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:57.409-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:05.422-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9920 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:04.112-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:19.604-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37624"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37249"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37725"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37542"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37460"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9917" version="5" class="vulnerability">
      <metadata>
        <title>The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1071"/>
        <description>The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:56.632-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:56.627-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:04.460-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9917 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:08.981-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:18.540-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30934"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30708"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30577"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30874"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30794"/>
          <criterion comment="kernel is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30892"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30873"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:31080"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30866"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9912" version="5" class="vulnerability">
      <metadata>
        <title>Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941"/>
        <description>Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:01.286-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:54.841-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:02.664-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9912 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:57.499-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:16.916-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="mailman is earlier than 3:2.1.5.1-25.rhel3.7" test_ref="oval:org.mitre.oval:tst:32470"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="mailman is earlier than 3:2.1.5.1-34.rhel4.5" test_ref="oval:org.mitre.oval:tst:32787"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9910" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461"/>
        <description>Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:25:11.203-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:54.313-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:02.117-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9910 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:24.863-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:16.079-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:32819"/>
            <criterion comment="libtiff is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32069"/>
            <criterion comment="kdegraphics is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:33012"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32843"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32922"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32413"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:991" version="4" class="vulnerability">
      <metadata>
        <title>Multiple BO Vulnerabilities in MIT Kerberos 5</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>MIT Kerberos 5 (krb5)</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0523"/>
        <description>Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier allow remote attackers to execute arbitrary code as root.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-29T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-07-21T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-08-04T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:53.979-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:12.209-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:991 - Typo Corrections" date="2014-05-22T11:01:00.943-04:00">
              <contributor organization="McAfee, Inc.">Jerome Athias</contributor>
            </modified>
            <status_change date="2014-05-22T11:03:38.761-04:00">INTERIM</status_change>
            <status_change date="2014-06-09T04:01:50.447-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criterion comment="ix86 architecture" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criterion comment="Red Hat Enterprise 3 is installed" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="krb5-libs rpm version prior to 1.2.7-24 is installed" test_ref="oval:org.mitre.oval:tst:1351"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9908" version="5" class="vulnerability">
      <metadata>
        <title>Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the protection mechanism for codebase principals and execute arbitrary script via the -moz-binding CSS property in a signed JAR file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023"/>
        <description>Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the protection mechanism for codebase principals and execute arbitrary script via the -moz-binding CSS property in a signed JAR file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:26.352-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:53.413-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:01.182-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9908 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:04.221-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:14.815-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9907" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0886"/>
        <description>Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:45.995-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:53.120-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:00.831-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9907 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:09.711-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:14.435-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="tetex-latex is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31559"/>
          <criterion comment="kdegraphics-devel is earlier than 7:3.1.3-3.7" test_ref="oval:org.mitre.oval:tst:30890"/>
          <criterion comment="libtiff is earlier than 0:3.5.7-20.1" test_ref="oval:org.mitre.oval:tst:31042"/>
          <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31693"/>
          <criterion comment="kdegraphics is earlier than 7:3.1.3-3.7" test_ref="oval:org.mitre.oval:tst:31096"/>
          <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31615"/>
          <criterion comment="tetex is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31603"/>
          <criterion comment="libtiff-devel is earlier than 0:3.5.7-20.1" test_ref="oval:org.mitre.oval:tst:31022"/>
          <criterion comment="tetex-afm is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31685"/>
          <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31747"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9906" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0007"/>
        <description>Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:14.903-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:52.896-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:00.639-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9906 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:44.361-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:14.171-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="gaim is earlier than 1:0.75-3.2.0" test_ref="oval:org.mitre.oval:tst:30440"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9904" version="5" class="vulnerability">
      <metadata>
        <title>Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377"/>
        <description>Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:26.189-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:52.436-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:16:00.153-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9904 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:51.281-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:13.385-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="perl-Net-DNS is earlier than 0:0.31-4.el3" test_ref="oval:org.mitre.oval:tst:34732"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="perl-Net-DNS is earlier than 0:0.48-2.el4" test_ref="oval:org.mitre.oval:tst:34581"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="perl-Net-DNS is earlier than 0:0.59-3.el5" test_ref="oval:org.mitre.oval:tst:34803"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9903" version="5" class="vulnerability">
      <metadata>
        <title>The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3806"/>
        <description>The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:54.626-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:51.984-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:59.686-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9903 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:37.341-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:12.754-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32525"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32366"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32381"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32215"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32464"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32288"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:31978"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32438"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32070"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32415"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32137"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32528"/>
            <criterion comment="kernel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:31866"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32446"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32450"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9902" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (apllication crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1175"/>
        <description>Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (apllication crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:54.396-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:51.653-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:59.362-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9902 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:35.444-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:12.197-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31712"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31065"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31933"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31927"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31772"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31800"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31846"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31172"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31706"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31781"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9900" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785"/>
        <description>Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:45.937-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:50.451-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:58.182-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9900 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:49.325-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:10.449-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:37358"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:37417"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:37346"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:36845"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:37059"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:37083"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:36603"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:37300"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:37075"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.22.el3" test_ref="oval:org.mitre.oval:tst:37472"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.8.1.el4" test_ref="oval:org.mitre.oval:tst:36782"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:37402"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:37430"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-14.el4" test_ref="oval:org.mitre.oval:tst:36999"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:37439"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:37337"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:36865"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.8.1.el4" test_ref="oval:org.mitre.oval:tst:36898"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.21.el4" test_ref="oval:org.mitre.oval:tst:36910"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:37455"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:36525"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:37362"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:36596"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-16.4.el4_6" test_ref="oval:org.mitre.oval:tst:37517"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-18.el5" test_ref="oval:org.mitre.oval:tst:37176"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.1-1.el5" test_ref="oval:org.mitre.oval:tst:37474"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.16-1.el5" test_ref="oval:org.mitre.oval:tst:37363"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.1-1.el5" test_ref="oval:org.mitre.oval:tst:37409"/>
            <criterion comment="devhelp is earlier than 0:0.12-18.el5" test_ref="oval:org.mitre.oval:tst:37522"/>
            <criterion comment="yelp is earlier than 0:2.16.0-20.el5" test_ref="oval:org.mitre.oval:tst:37008"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.1-1.el5" test_ref="oval:org.mitre.oval:tst:37414"/>
            <criterion comment="firefox is earlier than 0:3.0.1-1.el5" test_ref="oval:org.mitre.oval:tst:37297"/>
            <criterion comment="nspluginwrapper is earlier than 0:0.9.91.5-22.el5" test_ref="oval:org.mitre.oval:tst:37422"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9897" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415"/>
        <description>Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:31.823-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:49.161-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:56.950-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9897 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:06.410-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:09.330-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36256"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36236"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35996"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36279"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36046"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36052"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36034"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36284"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35748"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35994"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36164"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36050"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-8.el4" test_ref="oval:org.mitre.oval:tst:36202"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36193"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36093"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36053"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.10.el4" test_ref="oval:org.mitre.oval:tst:35919"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35600"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36141"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35397"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36203"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:36281"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:35480"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-8.el5" test_ref="oval:org.mitre.oval:tst:35675"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9895" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in ImageMagick before 6.2.9 allow user-assisted attackers to execute arbitrary code via crafted XCF images.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3743"/>
        <description>Multiple buffer overflows in ImageMagick before 6.2.9 allow user-assisted attackers to execute arbitrary code via crafted XCF images.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:04.556-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:48.550-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:56.382-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9895 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:25.810-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:08.472-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32037"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32699"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32588"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32852"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32735"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32383"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32971"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32748"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32946"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32537"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9894" version="5" class="vulnerability">
      <metadata>
        <title>OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0386"/>
        <description>OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:11.376-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:48.314-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:56.140-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9894 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:41.374-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:08.150-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="openssh is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32634"/>
          <criterion comment="openssh-askpass is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32130"/>
          <criterion comment="openssh-server is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32453"/>
          <criterion comment="openssh-clients is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32516"/>
          <criterion comment="openssh-askpass-gnome is earlier than 0:3.6.1p2-33.30.9" test_ref="oval:org.mitre.oval:tst:32587"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9893" version="5" class="vulnerability">
      <metadata>
        <title>Multiple vulnerabilities in libtiff before 3.8.1 allow context-dependent attackers to cause a denial of service via a TIFF image that triggers errors in (1) the TIFFFetchAnyArray function in (a) tif_dirread.c; (2) certain "codec cleanup methods" in (b) tif_lzw.c, (c) tif_pixarlog.c, and (d) tif_zip.c; (3) and improper restoration of setfield and getfield methods in cleanup functions within (e) tif_jpeg.c, tif_pixarlog.c, (f) tif_fax3.c, and tif_zip.c.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024"/>
        <description>Multiple vulnerabilities in libtiff before 3.8.1 allow context-dependent attackers to cause a denial of service via a TIFF image that triggers errors in (1) the TIFFFetchAnyArray function in (a) tif_dirread.c; (2) certain "codec cleanup methods" in (b) tif_lzw.c, (c) tif_pixarlog.c, and (d) tif_zip.c; (3) and improper restoration of setfield and getfield methods in cleanup functions within (e) tif_jpeg.c, tif_pixarlog.c, (f) tif_fax3.c, and tif_zip.c.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:49.067-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:48.008-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:55.834-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9893 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:33.443-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:07.724-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.5.7-25.el3.1" test_ref="oval:org.mitre.oval:tst:32689"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-25.el3.1" test_ref="oval:org.mitre.oval:tst:32435"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-10" test_ref="oval:org.mitre.oval:tst:32329"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-10" test_ref="oval:org.mitre.oval:tst:32637"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9890" version="5" class="vulnerability">
      <metadata>
        <title>Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0179"/>
        <description>Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:15.752-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:46.859-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:54.671-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9890 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:56.000-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:06.185-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30633"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31009"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30369"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30421"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30594"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30616"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9889" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238"/>
        <description>Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:02.547-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:46.338-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:53.955-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9889 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:07.827-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:05.410-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36547"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36570"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36574"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35661"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36605"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35672"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35874"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36533"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36355"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36379"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36587"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:35752"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-10.el4" test_ref="oval:org.mitre.oval:tst:36259"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36586"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36333"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36500"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.14.el4" test_ref="oval:org.mitre.oval:tst:35884"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36540"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36602"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36557"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36221"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36566"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36305"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-11.el5_1" test_ref="oval:org.mitre.oval:tst:36619"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9888" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226"/>
        <description>Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:57.587-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:45.969-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:53.605-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9888 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:16.855-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:04.825-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.5.10-14" test_ref="oval:org.mitre.oval:tst:37860"/>
            <criterion comment="libxml2-python is earlier than 0:2.5.10-14" test_ref="oval:org.mitre.oval:tst:37771"/>
            <criterion comment="libxml2 is earlier than 0:2.5.10-14" test_ref="oval:org.mitre.oval:tst:38036"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.16-12.6" test_ref="oval:org.mitre.oval:tst:37841"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.16-12.6" test_ref="oval:org.mitre.oval:tst:37839"/>
            <criterion comment="libxml2 is earlier than 0:2.6.16-12.6" test_ref="oval:org.mitre.oval:tst:37940"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.26-2.1.2.7" test_ref="oval:org.mitre.oval:tst:38044"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.26-2.1.2.7" test_ref="oval:org.mitre.oval:tst:37640"/>
            <criterion comment="libxml2 is earlier than 0:2.6.26-2.1.2.7" test_ref="oval:org.mitre.oval:tst:37694"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9886" version="5" class="vulnerability">
      <metadata>
        <title>Array index error in the gst_qtp_trak_handler function in gst/qtdemux/qtdemux.c in GStreamer Plug-ins (aka gstreamer-plugins) 0.6.0 allows remote attackers to have an unknown impact via a crafted QuickTime media file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0398"/>
        <description>Array index error in the gst_qtp_trak_handler function in gst/qtdemux/qtdemux.c in GStreamer Plug-ins (aka gstreamer-plugins) 0.6.0 allows remote attackers to have an unknown impact via a crafted QuickTime media file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:18.984-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:45.596-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:53.189-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9886 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:11.841-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:04.248-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="gstreamer-plugins-devel is earlier than 0:0.6.0-19" test_ref="oval:org.mitre.oval:tst:38088"/>
          <criterion comment="gstreamer-plugins is earlier than 0:0.6.0-19" test_ref="oval:org.mitre.oval:tst:38287"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9885" version="5" class="vulnerability">
      <metadata>
        <title>The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5174"/>
        <description>The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:06.557-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:45.177-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:52.707-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9885 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:10.946-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:03.660-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33074"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32633"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33103"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33001"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32937"/>
            <criterion comment="kernel is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32280"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33127"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32855"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33021"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33204"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33278"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33306"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:32378"/>
            <criterion comment="kernel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33145"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33107"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:32620"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:32645"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33057"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9884" version="5" class="vulnerability">
      <metadata>
        <title>browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesting URI to identify child windows, which allows remote attackers to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780"/>
        <description>browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesting URI to identify child windows, which allows remote attackers to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:19.280-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:44.545-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:52.104-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9884 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:32.650-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:02.824-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33391"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33688"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33675"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33724"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33510"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33409"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33467"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33658"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33649"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33381"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:32760"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33554"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33648"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:32765"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33712"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33705"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33379"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:33400"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:33759"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33678"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33695"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33697"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33244"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33645"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33461"/>
            <criterion comment="yelp is earlier than 0:2.16.0-14.0.1.el5" test_ref="oval:org.mitre.oval:tst:33761"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33744"/>
            <criterion comment="devhelp is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33415"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33616"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-1.el5" test_ref="oval:org.mitre.oval:tst:33493"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9881" version="5" class="vulnerability">
      <metadata>
        <title>Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0234"/>
        <description>Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:04.542-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:43.690-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:51.202-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9881 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:08.788-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:23:01.664-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="lha is earlier than 0:1.14i-10.2" test_ref="oval:org.mitre.oval:tst:30332"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:988" version="1" class="vulnerability">
      <metadata>
        <title>Ethereal MMSE Dissector Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0507"/>
        <description>Buffer overflow in the MMSE dissector for Ethereal 0.10.1 to 0.10.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criteria operator="OR" comment="Vulnerable Config">
            <criterion comment="ethereal version is less than 0.10.3-0.30E.2" negate="false" test_ref="oval:org.mitre.oval:tst:1359"/>
            <criterion comment="ethereal-gnome version is less than 0.10.3-0.30E.2" negate="false" test_ref="oval:org.mitre.oval:tst:1358"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="Vulnerable Config">
            <criteria operator="OR" comment="/usr/bin/ethereal is executable">
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1529"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1528"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1527"/>
            </criteria>
            <criteria operator="OR" comment="/usr/sbin/ethereal is executable">
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1526"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1525"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1524"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/tethereal is executable">
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1523"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1522"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1521"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9875" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.5 allow remote attackers to execute arbitrary code via a crafted XPCNativeWrapper.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738"/>
        <description>Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.5 allow remote attackers to execute arbitrary code via a crafted XPCNativeWrapper.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:42.973-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:41.545-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:48.915-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9875 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:54.928-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:58.436-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:33986"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34827"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34839"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34762"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34814"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34694"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34925"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34723"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34747"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34968"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34971"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.3.el4" test_ref="oval:org.mitre.oval:tst:34888"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34868"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34492"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34775"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.3.el4" test_ref="oval:org.mitre.oval:tst:34828"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34981"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34335"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34957"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34608"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34810"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34667"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34869"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9873" version="5" class="vulnerability">
      <metadata>
        <title>The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947"/>
        <description>The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:56.724-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:40.559-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:48.006-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9873 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:20.196-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:57.256-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35246"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35338"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35812"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35754"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35763"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35809"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35651"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35146"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35423"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35775"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35664"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35628"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-7.el4" test_ref="oval:org.mitre.oval:tst:35520"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35267"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35702"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35858"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.8.el4" test_ref="oval:org.mitre.oval:tst:34811"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35523"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35602"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35697"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:34917"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-7.el5" test_ref="oval:org.mitre.oval:tst:35421"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-7.el5" test_ref="oval:org.mitre.oval:tst:35528"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-7.el5" test_ref="oval:org.mitre.oval:tst:35742"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9872" version="5" class="vulnerability">
      <metadata>
        <title>The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018"/>
        <description>The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:32.387-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:39.910-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:47.381-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9872 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:02.598-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:56.397-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-17.el4" test_ref="oval:org.mitre.oval:tst:37872"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.18-1.el5" test_ref="oval:org.mitre.oval:tst:38015"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9870" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0736"/>
        <description>Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:15.376-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:39.212-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:46.691-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9870 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:18.940-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:55.510-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31148"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31473"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31178"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31282"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31565"/>
            <criterion comment="kernel is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31562"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31582"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:30730"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31534"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31545"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31539"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31661"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31482"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31112"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31605"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31330"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:987" version="1" class="vulnerability">
      <metadata>
        <title>Ethereal SPNEGO Dissector Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0506"/>
        <description>The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (crash) via unknown attack vectors that cause a null pointer dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criteria operator="OR" comment="Vulnerable Config">
            <criterion comment="ethereal version is less than 0.10.3-0.30E.2" negate="false" test_ref="oval:org.mitre.oval:tst:1359"/>
            <criterion comment="ethereal-gnome version is less than 0.10.3-0.30E.2" negate="false" test_ref="oval:org.mitre.oval:tst:1358"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="Vulnerable Config">
            <criteria operator="OR" comment="/usr/bin/ethereal is executable">
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1529"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1528"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1527"/>
            </criteria>
            <criteria operator="OR" comment="/usr/sbin/ethereal is executable">
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1526"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1525"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1524"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/tethereal is executable">
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1523"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1522"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1521"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9869" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the SCSI dissector in Wireshark (formerly Ethereal) 0.99.2 allows remote attackers to cause a denial of service (crash) via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4330"/>
        <description>Unspecified vulnerability in the SCSI dissector in Wireshark (formerly Ethereal) 0.99.2 allows remote attackers to cause a denial of service (crash) via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:26.391-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:38.933-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:46.432-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9869 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:26.730-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:55.137-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.3-EL3.2" test_ref="oval:org.mitre.oval:tst:33011"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.3-EL3.2" test_ref="oval:org.mitre.oval:tst:32323"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.3-EL4.2" test_ref="oval:org.mitre.oval:tst:33025"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.3-EL4.2" test_ref="oval:org.mitre.oval:tst:32974"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9867" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0497"/>
        <description>Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:06.252-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:38.351-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:45.708-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9867 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:00.216-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:54.311-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.0.3.EL" test_ref="oval:org.mitre.oval:tst:30726"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.0.3.EL" test_ref="oval:org.mitre.oval:tst:29909"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.0.3.EL" test_ref="oval:org.mitre.oval:tst:30725"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.0.3.EL" test_ref="oval:org.mitre.oval:tst:30253"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.0.3.EL" test_ref="oval:org.mitre.oval:tst:30583"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.0.3.EL" test_ref="oval:org.mitre.oval:tst:29798"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.0.3.EL" test_ref="oval:org.mitre.oval:tst:30668"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.0.3.EL" test_ref="oval:org.mitre.oval:tst:30738"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.0.3.EL" test_ref="oval:org.mitre.oval:tst:30652"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9866" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the sFlow dissector in Ethereal 0.9.14 through 0.10.9 allows remote attackers to cause a denial of service (application crash).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0766"/>
        <description>Unknown vulnerability in the sFlow dissector in Ethereal 0.9.14 through 0.10.9 allows remote attackers to cause a denial of service (application crash).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:24.462-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:38.111-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:45.452-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9866 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:09.242-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:53.861-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.10-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31514"/>
            <criterion comment="ethereal is earlier than 0:0.10.10-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31448"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.10-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31593"/>
            <criterion comment="ethereal is earlier than 0:0.10.10-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31548"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9865" version="5" class="vulnerability">
      <metadata>
        <title>The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811"/>
        <description>The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:10.662-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:37.447-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:44.825-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9865 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:51:56.667-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:53.101-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37286"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37033"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37126"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37105"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37271"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37279"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37060"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37189"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36476"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36916"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37192"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-14.el4" test_ref="oval:org.mitre.oval:tst:36999"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36886"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37331"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36365"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.19.el4" test_ref="oval:org.mitre.oval:tst:37174"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37226"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36766"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36826"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37274"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37107"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:37351"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.16-1.el5" test_ref="oval:org.mitre.oval:tst:37363"/>
            <criterion comment="xulrunner is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36984"/>
            <criterion comment="devhelp is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37234"/>
            <criterion comment="yelp is earlier than 0:2.16.0-19.el5" test_ref="oval:org.mitre.oval:tst:37291"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36436"/>
            <criterion comment="firefox is earlier than 0:3.0-2.el5" test_ref="oval:org.mitre.oval:tst:36814"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9863" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE.  NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376"/>
        <description>Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE.  NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:51.866-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:36.715-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:43.945-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9863 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:21.391-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:51.987-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:36968"/>
            <criterion comment="ruby-docs is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37000"/>
            <criterion comment="ruby-devel is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:36747"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37140"/>
            <criterion comment="ruby is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37342"/>
            <criterion comment="irb is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37252"/>
            <criterion comment="ruby-libs is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37305"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37171"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37242"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36569"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37296"/>
            <criterion comment="ruby is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36468"/>
            <criterion comment="irb is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36808"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37219"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-ri is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37199"/>
            <criterion comment="ruby-mode is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36604"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36516"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36870"/>
            <criterion comment="ruby is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36738"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37119"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37289"/>
            <criterion comment="ruby-irb is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37148"/>
            <criterion comment="ruby-rdoc is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37203"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9861" version="5" class="vulnerability">
      <metadata>
        <title>digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721"/>
        <description>digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:32.582-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:36.135-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:43.344-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9861 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:38.936-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:50.999-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cyrus-sasl-plain is earlier than 0:2.1.15-15" test_ref="oval:org.mitre.oval:tst:35185"/>
            <criterion comment="cyrus-sasl-md5 is earlier than 0:2.1.15-15" test_ref="oval:org.mitre.oval:tst:35067"/>
            <criterion comment="cyrus-sasl-gssapi is earlier than 0:2.1.15-15" test_ref="oval:org.mitre.oval:tst:35028"/>
            <criterion comment="cyrus-sasl-devel is earlier than 0:2.1.15-15" test_ref="oval:org.mitre.oval:tst:34649"/>
            <criterion comment="cyrus-sasl is earlier than 0:2.1.15-15" test_ref="oval:org.mitre.oval:tst:35113"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cyrus-sasl-ntlm is earlier than 0:2.1.19-14" test_ref="oval:org.mitre.oval:tst:35092"/>
            <criterion comment="cyrus-sasl-sql is earlier than 0:2.1.19-14" test_ref="oval:org.mitre.oval:tst:35100"/>
            <criterion comment="cyrus-sasl-plain is earlier than 0:2.1.19-14" test_ref="oval:org.mitre.oval:tst:34748"/>
            <criterion comment="cyrus-sasl-md5 is earlier than 0:2.1.19-14" test_ref="oval:org.mitre.oval:tst:34948"/>
            <criterion comment="cyrus-sasl-gssapi is earlier than 0:2.1.19-14" test_ref="oval:org.mitre.oval:tst:35102"/>
            <criterion comment="cyrus-sasl-devel is earlier than 0:2.1.19-14" test_ref="oval:org.mitre.oval:tst:34645"/>
            <criterion comment="cyrus-sasl is earlier than 0:2.1.19-14" test_ref="oval:org.mitre.oval:tst:34338"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9860" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow,  related to the number of responses or repeats.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309"/>
        <description>Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow,  related to the number of responses or repeats.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:35.483-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:35.676-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:42.889-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9860 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:23.820-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:50.422-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.0.9-2.30E.25" test_ref="oval:org.mitre.oval:tst:37666"/>
            <criterion comment="net-snmp is earlier than 0:5.0.9-2.30E.25" test_ref="oval:org.mitre.oval:tst:37742"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.0.9-2.30E.25" test_ref="oval:org.mitre.oval:tst:37538"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.0.9-2.30E.25" test_ref="oval:org.mitre.oval:tst:37806"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.0.9-2.30E.25" test_ref="oval:org.mitre.oval:tst:37593"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.1.2-13.el4_7.2" test_ref="oval:org.mitre.oval:tst:37167"/>
            <criterion comment="net-snmp is earlier than 0:5.1.2-13.el4_7.2" test_ref="oval:org.mitre.oval:tst:37819"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.1.2-13.el4_7.2" test_ref="oval:org.mitre.oval:tst:37707"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.1.2-13.el4_7.2" test_ref="oval:org.mitre.oval:tst:37868"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.1.2-13.el4_7.2" test_ref="oval:org.mitre.oval:tst:37115"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 1:5.3.1-24.el5_2.2" test_ref="oval:org.mitre.oval:tst:36966"/>
            <criterion comment="net-snmp is earlier than 1:5.3.1-24.el5_2.2" test_ref="oval:org.mitre.oval:tst:37758"/>
            <criterion comment="net-snmp-libs is earlier than 1:5.3.1-24.el5_2.2" test_ref="oval:org.mitre.oval:tst:37686"/>
            <criterion comment="net-snmp-perl is earlier than 1:5.3.1-24.el5_2.2" test_ref="oval:org.mitre.oval:tst:37927"/>
            <criterion comment="net-snmp-devel is earlier than 1:5.3.1-24.el5_2.2" test_ref="oval:org.mitre.oval:tst:37801"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:986" version="1" class="vulnerability">
      <metadata>
        <title>Ethereal AIM Dissector Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0505"/>
        <description>The AIM dissector in Ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error) via unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criteria operator="OR" comment="Vulnerable Config">
            <criterion comment="ethereal version is less than 0.10.3-0.30E.2" negate="false" test_ref="oval:org.mitre.oval:tst:1359"/>
            <criterion comment="ethereal-gnome version is less than 0.10.3-0.30E.2" negate="false" test_ref="oval:org.mitre.oval:tst:1358"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="Vulnerable Config">
            <criteria operator="OR" comment="/usr/bin/ethereal is executable">
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1529"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1528"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1527"/>
            </criteria>
            <criteria operator="OR" comment="/usr/sbin/ethereal is executable">
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1526"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1525"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1524"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/tethereal is executable">
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1523"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1522"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1521"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9859" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063"/>
        <description>Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:17.627-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:35.122-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:42.322-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9859 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:47.992-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:49.617-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.9-1.3E.17" test_ref="oval:org.mitre.oval:tst:40725"/>
            <criterion comment="samba-swat is earlier than 0:3.0.9-1.3E.17" test_ref="oval:org.mitre.oval:tst:40543"/>
            <criterion comment="samba-client is earlier than 0:3.0.9-1.3E.17" test_ref="oval:org.mitre.oval:tst:40781"/>
            <criterion comment="samba is earlier than 0:3.0.9-1.3E.17" test_ref="oval:org.mitre.oval:tst:40546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.33-0.19.el4_8.1" test_ref="oval:org.mitre.oval:tst:40212"/>
            <criterion comment="samba-swat is earlier than 0:3.0.33-0.19.el4_8.1" test_ref="oval:org.mitre.oval:tst:40761"/>
            <criterion comment="samba-client is earlier than 0:3.0.33-0.19.el4_8.1" test_ref="oval:org.mitre.oval:tst:40021"/>
            <criterion comment="samba is earlier than 0:3.0.33-0.19.el4_8.1" test_ref="oval:org.mitre.oval:tst:40520"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tdb-tools is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40785"/>
            <criterion comment="libtdb-devel is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:39928"/>
            <criterion comment="samba3x-winbind-devel is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40808"/>
            <criterion comment="samba3x-common is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40403"/>
            <criterion comment="libsmbclient is earlier than 0:3.0.33-3.29.el5_5" test_ref="oval:org.mitre.oval:tst:40124"/>
            <criterion comment="samba3x-doc is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40792"/>
            <criterion comment="samba3x-domainjoin-gui is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40636"/>
            <criterion comment="libtalloc-devel is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40508"/>
            <criterion comment="libtdb is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40589"/>
            <criterion comment="libsmbclient-devel is earlier than 0:3.0.33-3.29.el5_5" test_ref="oval:org.mitre.oval:tst:40500"/>
            <criterion comment="samba3x-client is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40646"/>
            <criterion comment="samba3x is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40660"/>
            <criterion comment="libtalloc is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40439"/>
            <criterion comment="samba3x-swat is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40724"/>
            <criterion comment="samba-common is earlier than 0:3.0.33-3.29.el5_5" test_ref="oval:org.mitre.oval:tst:40663"/>
            <criterion comment="samba-swat is earlier than 0:3.0.33-3.29.el5_5" test_ref="oval:org.mitre.oval:tst:40822"/>
            <criterion comment="samba-client is earlier than 0:3.0.33-3.29.el5_5" test_ref="oval:org.mitre.oval:tst:40799"/>
            <criterion comment="samba3x-winbind is earlier than 0:3.3.8-0.52.el5_5" test_ref="oval:org.mitre.oval:tst:40481"/>
            <criterion comment="samba is earlier than 0:3.0.33-3.29.el5_5" test_ref="oval:org.mitre.oval:tst:39867"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9858" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2933"/>
        <description>Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:13.577-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:34.202-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:41.736-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9858 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:40.490-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:48.928-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-mysql is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32711"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32166"/>
            <criterion comment="imap is earlier than 1:2002d-12" test_ref="oval:org.mitre.oval:tst:31804"/>
            <criterion comment="imap-devel is earlier than 1:2002d-12" test_ref="oval:org.mitre.oval:tst:32091"/>
            <criterion comment="php is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32579"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32613"/>
            <criterion comment="imap-utils is earlier than 1:2002d-12" test_ref="oval:org.mitre.oval:tst:32441"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32425"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32107"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32695"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:31742"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32509"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32606"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32503"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32185"/>
            <criterion comment="libc-client is earlier than 0:2002e-14" test_ref="oval:org.mitre.oval:tst:32375"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32639"/>
            <criterion comment="php is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32546"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32577"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32236"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32578"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32591"/>
            <criterion comment="libc-client-devel is earlier than 0:2002e-14" test_ref="oval:org.mitre.oval:tst:32344"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32707"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32547"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:31727"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9857" version="5" class="vulnerability">
      <metadata>
        <title>The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in racoon in ipsec-tools before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732"/>
        <description>The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in racoon in ipsec-tools before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:39.780-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:33.922-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:41.492-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9857 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:47.575-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:48.577-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="ipsec-tools is earlier than 0:0.2.5-0.7.rhel3.3" test_ref="oval:org.mitre.oval:tst:32025"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="ipsec-tools is earlier than 0:0.3.3-6.rhel4.1" test_ref="oval:org.mitre.oval:tst:32632"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9854" version="5" class="vulnerability">
      <metadata>
        <title>Multiple extfs backend scripts for GNOME virtual file system (VFS) before 1.0.1 may allow remote attackers to perform certain unauthorized actions via a gnome-vfs URI.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0494"/>
        <description>Multiple extfs backend scripts for GNOME virtual file system (VFS) before 1.0.1 may allow remote attackers to perform certain unauthorized actions via a gnome-vfs URI.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:02.913-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:33.309-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:40.758-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9854 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:57.291-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:47.620-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="gnome-vfs2-devel is earlier than 0:2.2.5-2E.1" test_ref="oval:org.mitre.oval:tst:30568"/>
          <criterion comment="gnome-vfs2 is earlier than 0:2.2.5-2E.1" test_ref="oval:org.mitre.oval:tst:30787"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9853" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in the (1) SIP, (2) CMIP, (3) CMP, (4) CMS, (5) CRMF, (6) ESS, (7) OCSP, (8) X.509, (9) ISIS, (10) DISTCC, (11) FCELS, (12) Q.931, (13) NCP, (14) TCAP, (15) ISUP, (16) MEGACO, (17) PKIX1Explitit, (18) PKIX_Qualified, (19) Presentation dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1461"/>
        <description>Multiple buffer overflows in the (1) SIP, (2) CMIP, (3) CMP, (4) CMS, (5) CRMF, (6) ESS, (7) OCSP, (8) X.509, (9) ISIS, (10) DISTCC, (11) FCELS, (12) Q.931, (13) NCP, (14) TCAP, (15) ISUP, (16) MEGACO, (17) PKIX1Explitit, (18) PKIX_Qualified, (19) Presentation dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:12.258-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:33.072-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:40.507-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9853 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:24.939-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:47.233-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9852" version="5" class="vulnerability">
      <metadata>
        <title>Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in (1) the URL or (2) an e-mail message.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1769"/>
        <description>Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in (1) the URL or (2) an e-mail message.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:17.382-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:32.818-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:40.279-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9852 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:54.383-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:46.801-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.3a-11.EL3" test_ref="oval:org.mitre.oval:tst:31585"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.3a-12.EL4" test_ref="oval:org.mitre.oval:tst:31556"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9851" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423"/>
        <description>Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:32.959-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:32.531-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:39.925-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9851 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:43.147-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:46.327-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.0-10.el3" test_ref="oval:org.mitre.oval:tst:36659"/>
            <criterion comment="libvorbis is earlier than 1:1.0-10.el3" test_ref="oval:org.mitre.oval:tst:36699"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 0:1.1.0-3.el4_6.1" test_ref="oval:org.mitre.oval:tst:36519"/>
            <criterion comment="libvorbis is earlier than 0:1.1.0-3.el4_6.1" test_ref="oval:org.mitre.oval:tst:36387"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 0:1.1.2-3.el5_1.2" test_ref="oval:org.mitre.oval:tst:36439"/>
            <criterion comment="libvorbis is earlier than 0:1.1.2-3.el5_1.2" test_ref="oval:org.mitre.oval:tst:36710"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9850" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Ethereal 0.8.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via the (1) Sniffer capture or (2) SMB PIPE dissector.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1938"/>
        <description>Multiple unspecified vulnerabilities in Ethereal 0.8.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via the (1) Sniffer capture or (2) SMB PIPE dissector.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:28.542-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:32.289-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:39.672-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9850 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:02.526-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:45.905-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.99.0-EL3.2" test_ref="oval:org.mitre.oval:tst:32590"/>
            <criterion comment="ethereal is earlier than 0:0.99.0-EL3.2" test_ref="oval:org.mitre.oval:tst:32631"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.99.0-EL4.2" test_ref="oval:org.mitre.oval:tst:32299"/>
            <criterion comment="ethereal is earlier than 0:0.99.0-EL4.2" test_ref="oval:org.mitre.oval:tst:32238"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9849" version="5" class="vulnerability">
      <metadata>
        <title>Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776"/>
        <description>Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:02.200-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:31.726-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:39.158-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9849 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:45.820-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:45.288-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32575"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32674"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32919"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32864"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32659"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32859"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32902"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32837"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9848" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in Info-Zip 2.3 and possibly earlier versions, when using recursive folder compression, allows remote attackers to execute arbitrary code via a ZIP file containing a long pathname.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1010"/>
        <description>Buffer overflow in Info-Zip 2.3 and possibly earlier versions, when using recursive folder compression, allows remote attackers to execute arbitrary code via a ZIP file containing a long pathname.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:22.001-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:31.544-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:38.914-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9848 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:41.403-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:44.965-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="zip is earlier than 0:2.3-16.1" test_ref="oval:org.mitre.oval:tst:31068"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9846" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6063"/>
        <description>Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:29.687-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:30.659-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:38.052-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9846 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:28.362-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:44.181-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37931"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37846"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37817"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37663"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37799"/>
            <criterion comment="kernel is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37028"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37885"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37981"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37117"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:36090"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35525"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35832"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35126"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35901"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:36007"/>
            <criterion comment="kernel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35982"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:36072"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:36041"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35364"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35662"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:36192"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:36176"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:36335"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:36430"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:35944"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:36215"/>
            <criterion comment="kernel is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:36409"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:35484"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:35974"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:35791"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:36150"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-53.1.14.el5" test_ref="oval:org.mitre.oval:tst:36251"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9845" version="5" class="vulnerability">
      <metadata>
        <title>Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename.  NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1686"/>
        <description>Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename.  NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:01.759-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:30.427-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:37.774-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9845 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:56.618-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:43.772-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gedit is earlier than 1:2.2.2-4.rhel3" test_ref="oval:org.mitre.oval:tst:31476"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gedit is earlier than 1:2.8.1-4" test_ref="oval:org.mitre.oval:tst:31796"/>
            <criterion comment="gedit-devel is earlier than 1:2.8.1-4" test_ref="oval:org.mitre.oval:tst:31886"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9843" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 1.5.0.7 and SeaMonkey before 1.0.5 allows remote attackers to bypass the security model and inject content into the sub-frame of another site via targetWindow.frames[n].document.open(), which facilitates spoofing and other attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568"/>
        <description>Mozilla Firefox before 1.5.0.7 and SeaMonkey before 1.0.5 allows remote attackers to bypass the security model and inject content into the sub-frame of another site via targetWindow.frames[n].document.open(), which facilitates spoofing and other attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:25:02.251-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:29.685-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:37.007-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9843 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:26.610-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:42.819-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32759"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32989"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32809"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32779"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32954"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32668"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33010"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32811"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32981"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33061"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:32072"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33120"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32842"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32677"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32933"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32243"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:33062"/>
            <criterion comment="firefox is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32951"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32978"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33072"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33079"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32121"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33077"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9841" version="5" class="vulnerability">
      <metadata>
        <title>Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP3 packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113"/>
        <description>Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP3 packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:20.400-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:28.758-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:36.202-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9841 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:33.180-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:41.661-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:36051"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:35980"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35669"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:35709"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:36120"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35712"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35801"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:984" version="4" class="vulnerability">
      <metadata>
        <title>Racoon Denial of Service via Large Length Field</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0403"/>
        <description>Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-12T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-16T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-30T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:52.316-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:12.021-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.756-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T20:54:36.823-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:48.066-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="ipsec-tools version is less than 0.2.5-0.4" negate="false" test_ref="oval:org.mitre.oval:tst:1430"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="racoon is listening on the network" negate="false" test_ref="oval:org.mitre.oval:tst:1429"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9839" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393"/>
        <description>Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:25.655-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:27.692-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:35.083-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9839 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:50.300-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:40.015-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.11" test_ref="oval:org.mitre.oval:tst:35542"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.11" test_ref="oval:org.mitre.oval:tst:35314"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.11" test_ref="oval:org.mitre.oval:tst:35233"/>
            <criterion comment="cups-libs is earlier than 0:1.1.17-13.3.46" test_ref="oval:org.mitre.oval:tst:35218"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.11" test_ref="oval:org.mitre.oval:tst:35248"/>
            <criterion comment="cups-devel is earlier than 0:1.1.17-13.3.46" test_ref="oval:org.mitre.oval:tst:35491"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.11" test_ref="oval:org.mitre.oval:tst:34644"/>
            <criterion comment="xpdf is earlier than 0:2.02-11.el3" test_ref="oval:org.mitre.oval:tst:35634"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.11" test_ref="oval:org.mitre.oval:tst:35275"/>
            <criterion comment="cups is earlier than 0:1.1.17-13.3.46" test_ref="oval:org.mitre.oval:tst:35533"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:34998"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-6.el4_5" test_ref="oval:org.mitre.oval:tst:35446"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35156"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-6.el4_5" test_ref="oval:org.mitre.oval:tst:35404"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35455"/>
            <criterion comment="cups-libs is earlier than 0:1.1.22-0.rc1.9.20.2.el4_5.2" test_ref="oval:org.mitre.oval:tst:35415"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35178"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.1" test_ref="oval:org.mitre.oval:tst:35574"/>
            <criterion comment="cups-devel is earlier than 0:1.1.22-0.rc1.9.20.2.el4_5.2" test_ref="oval:org.mitre.oval:tst:34735"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35585"/>
            <criterion comment="xpdf is earlier than 1:3.00-14.el4" test_ref="oval:org.mitre.oval:tst:35315"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35591"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.10" test_ref="oval:org.mitre.oval:tst:35283"/>
            <criterion comment="cups is earlier than 0:1.1.22-0.rc1.9.20.2.el4_5.2" test_ref="oval:org.mitre.oval:tst:35537"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-5.el5_1" test_ref="oval:org.mitre.oval:tst:35714"/>
            <criterion comment="cups-lpd is earlier than 0:1.2.4-11.14.el5_1.3" test_ref="oval:org.mitre.oval:tst:35274"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35509"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-5.el5_1" test_ref="oval:org.mitre.oval:tst:35722"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.3.el5_1" test_ref="oval:org.mitre.oval:tst:35549"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35527"/>
            <criterion comment="cups-libs is earlier than 0:1.2.4-11.14.el5_1.3" test_ref="oval:org.mitre.oval:tst:35427"/>
            <criterion comment="tetex is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35459"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:34727"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.3.el5_1" test_ref="oval:org.mitre.oval:tst:35496"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35498"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.3.el5_1" test_ref="oval:org.mitre.oval:tst:35147"/>
            <criterion comment="cups-devel is earlier than 0:1.2.4-11.14.el5_1.3" test_ref="oval:org.mitre.oval:tst:35508"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:35407"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.2.el5_1.2" test_ref="oval:org.mitre.oval:tst:34618"/>
            <criterion comment="cups is earlier than 0:1.2.4-11.14.el5_1.3" test_ref="oval:org.mitre.oval:tst:35530"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9837" version="5" class="vulnerability">
      <metadata>
        <title>Multiple stack-based buffer overflows in the putstring function in find.c in Cscope before 15.6 allow user-assisted remote attackers to execute arbitrary code via a long (1) function name or (2) symbol in a source-code file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1577"/>
        <description>Multiple stack-based buffer overflows in the putstring function in find.c in Cscope before 15.6 allow user-assisted remote attackers to execute arbitrary code via a long (1) function name or (2) symbol in a source-code file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:55.117-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:27.162-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:34.470-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9837 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:48.413-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:39.227-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="cscope is earlier than 0:15.5-16.RHEL3" test_ref="oval:org.mitre.oval:tst:38743"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="cscope is earlier than 0:15.5-10.RHEL4.3" test_ref="oval:org.mitre.oval:tst:38662"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9836" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow remote attackers to execute arbitrary code via unknown vectors in the (1) SLIMP3 and (2) AgentX dissector.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3243"/>
        <description>Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow remote attackers to execute arbitrary code via unknown vectors in the (1) SLIMP3 and (2) AgentX dissector.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:11.872-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:26.876-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:34.146-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9836 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:32.790-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:38.789-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32189"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32138"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32341"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32202"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9834" version="5" class="vulnerability">
      <metadata>
        <title>Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-0175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175"/>
        <description>Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:58.954-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:26.140-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:33.343-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9834 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:56.555-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:37.671-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40246"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39934"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40184"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40133"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39775"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40360"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40059"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39946"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40114"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39403"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.19-1.el4" test_ref="oval:org.mitre.oval:tst:40284"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40081"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40250"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40304"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40345"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40183"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:39945"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:40265"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:39621"/>
            <criterion comment="firefox is earlier than 0:3.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:40064"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:40164"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9830" version="5" class="vulnerability">
      <metadata>
        <title>Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-2014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2014"/>
        <description>Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:25:25.497-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:25.002-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:31.815-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9830 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:42.262-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:35.984-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="wget is earlier than 0:1.10.1-1.30E.1" test_ref="oval:org.mitre.oval:tst:31680"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="wget is earlier than 0:1.10.1-2.4E.1" test_ref="oval:org.mitre.oval:tst:31717"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9826" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Mozilla to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0594"/>
        <description>Mozilla allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Mozilla to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:40.916-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:23.741-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:30.560-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9826 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:43.850-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:34.679-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30703"/>
          <criterion comment="mozilla is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30682"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:29813"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:29961"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30646"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30390"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30528"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30482"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30659"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9825" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unknown vulnerabilities in the (1) AIM, (2) LDAP, (3) FibreChannel, (4) GSM_MAP, (5) SRVLOC, and (6) NTLMSSP dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1457"/>
        <description>Multiple unknown vulnerabilities in the (1) AIM, (2) LDAP, (3) FibreChannel, (4) GSM_MAP, (5) SRVLOC, and (6) NTLMSSP dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:01.294-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:23.494-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:30.308-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9825 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:41.586-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:34.309-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9824" version="5" class="vulnerability">
      <metadata>
        <title>cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863"/>
        <description>cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:19.575-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:23.126-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:29.870-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9824 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:06.406-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:33.675-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-67.ent" test_ref="oval:org.mitre.oval:tst:34223"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.46-67.ent" test_ref="oval:org.mitre.oval:tst:34500"/>
            <criterion comment="httpd is earlier than 0:2.0.46-67.ent" test_ref="oval:org.mitre.oval:tst:34481"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-32.2.ent" test_ref="oval:org.mitre.oval:tst:34166"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-32.2.ent" test_ref="oval:org.mitre.oval:tst:34468"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-32.2.ent" test_ref="oval:org.mitre.oval:tst:34603"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.52-32.2.ent" test_ref="oval:org.mitre.oval:tst:34461"/>
            <criterion comment="httpd is earlier than 0:2.0.52-32.2.ent" test_ref="oval:org.mitre.oval:tst:34632"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-manual is earlier than 0:2.2.3-7.el5" test_ref="oval:org.mitre.oval:tst:34730"/>
            <criterion comment="httpd-devel is earlier than 0:2.2.3-7.el5" test_ref="oval:org.mitre.oval:tst:34677"/>
            <criterion comment="mod_ssl is earlier than 1:2.2.3-7.el5" test_ref="oval:org.mitre.oval:tst:34399"/>
            <criterion comment="httpd is earlier than 0:2.2.3-7.el5" test_ref="oval:org.mitre.oval:tst:34605"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9823" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one error in the OID printing routine in Ethereal 0.10.x up to 0.10.14 has unknown impact and remote attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1932"/>
        <description>Off-by-one error in the OID printing routine in Ethereal 0.10.x up to 0.10.14 has unknown impact and remote attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:21.198-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:22.833-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:29.611-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9823 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:52.980-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:33.294-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.99.0-EL3.2" test_ref="oval:org.mitre.oval:tst:32590"/>
            <criterion comment="ethereal is earlier than 0:0.99.0-EL3.2" test_ref="oval:org.mitre.oval:tst:32631"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.99.0-EL4.2" test_ref="oval:org.mitre.oval:tst:32299"/>
            <criterion comment="ethereal is earlier than 0:0.99.0-EL4.2" test_ref="oval:org.mitre.oval:tst:32238"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9821" version="5" class="vulnerability">
      <metadata>
        <title>The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683"/>
        <description>The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:21.139-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:22.218-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:28.933-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9821 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:46.040-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:32.359-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38023"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38321"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38000"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38041"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38236"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38085"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9820" version="5" class="vulnerability">
      <metadata>
        <title>The JavaScript engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsDOMClassInfo.cpp, (2) JS_HashTableRawLookup, and (3) MirrorWrappedNativeParent and js_LockGCThingRT.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2466"/>
        <description>The JavaScript engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsDOMClassInfo.cpp, (2) JS_HashTableRawLookup, and (3) MirrorWrappedNativeParent and js_LockGCThingRT.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:25:30.780-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:21.658-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:28.429-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9820 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:59.508-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:31.641-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38881"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38851"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38690"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38366"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38475"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38924"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38923"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38918"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38811"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38644"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38772"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:37948"/>
            <criterion comment="firefox is earlier than 0:3.0.12-1.el4" test_ref="oval:org.mitre.oval:tst:38809"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38947"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38194"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38876"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38504"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.12-1.el5_3" test_ref="oval:org.mitre.oval:tst:38249"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.12-1.el5_3" test_ref="oval:org.mitre.oval:tst:38575"/>
            <criterion comment="firefox is earlier than 0:3.0.12-1.el5_3" test_ref="oval:org.mitre.oval:tst:38853"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.12-1.el5_3" test_ref="oval:org.mitre.oval:tst:38563"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:982" version="1" class="vulnerability">
      <metadata>
        <title>Ethereal Denial of Service via SIP Messages</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0504"/>
        <description>Ethereal 0.10.3 allows remote attackers to cause a denial of service (crash) via certain SIP messages between Hotsip servers and clients.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criteria operator="OR" comment="Vulnerable Config">
            <criterion comment="ethereal version is less than 0.10.3-0.30E.2" negate="false" test_ref="oval:org.mitre.oval:tst:1359"/>
            <criterion comment="ethereal-gnome version is less than 0.10.3-0.30E.2" negate="false" test_ref="oval:org.mitre.oval:tst:1358"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="Vulnerable Config">
            <criteria operator="OR" comment="/usr/bin/ethereal is executable">
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1529"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1528"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1527"/>
            </criteria>
            <criteria operator="OR" comment="/usr/sbin/ethereal is executable">
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1526"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1525"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1524"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/tethereal is executable">
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1523"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1522"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1521"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9819" version="5" class="vulnerability">
      <metadata>
        <title>Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1689"/>
        <description>Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:44.542-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:21.337-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:28.103-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9819 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:53.520-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:31.186-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31712"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31065"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31933"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31927"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31772"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31800"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31846"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31172"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31706"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-17" test_ref="oval:org.mitre.oval:tst:31781"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9818" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312"/>
        <description>Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:59.412-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:20.808-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:27.568-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9818 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:02.938-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:30.469-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38597"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38375"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38403"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38521"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38542"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:37726"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38677"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38096"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38577"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38540"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.9-1.el4" test_ref="oval:org.mitre.oval:tst:38379"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38716"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38634"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38190"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38596"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38685"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38697"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38308"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38633"/>
            <criterion comment="firefox is earlier than 0:3.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38370"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38462"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9817" version="5" class="vulnerability">
      <metadata>
        <title>The CSS border-rendering code in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain Cascading Style Sheets (CSS) that causes an out-of-bounds array write and buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739"/>
        <description>The CSS border-rendering code in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain Cascading Style Sheets (CSS) that causes an out-of-bounds array write and buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:40.844-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:20.317-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:27.070-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9817 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:26.577-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:29.679-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9815" version="5" class="vulnerability">
      <metadata>
        <title>js/src/xpconnect/src/xpcwrappedjsclass.cpp in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to execute arbitrary web script with the privileges of a chrome object, as demonstrated by the browser sidebar and the FeedWriter.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841"/>
        <description>js/src/xpconnect/src/xpcwrappedjsclass.cpp in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to execute arbitrary web script with the privileges of a chrome object, as demonstrated by the browser sidebar and the FeedWriter.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:17.588-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:19.589-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:26.339-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9815 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:22.619-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:28.697-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38336"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38452"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38736"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38742"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38069"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38264"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38724"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38791"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38432"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:37902"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.11-4.el4" test_ref="oval:org.mitre.oval:tst:38689"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38280"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38793"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38531"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38655"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38828"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38213"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38771"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38371"/>
            <criterion comment="firefox is earlier than 0:3.0.11-2.el5_3" test_ref="oval:org.mitre.oval:tst:38682"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38718"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9814" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to run arbitrary JavaScript with chrome privileges via unknown vectors in which "page content can pollute XPCNativeWrappers."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512"/>
        <description>Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to run arbitrary JavaScript with chrome privileges via unknown vectors in which "page content can pollute XPCNativeWrappers."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:59.318-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:18.500-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:25.657-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9814 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:12.276-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:27.854-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38137"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37886"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37999"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37907"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37709"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38092"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37745"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38039"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38062"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38073"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37574"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38071"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37857"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-18.el4" test_ref="oval:org.mitre.oval:tst:37200"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37812"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el4" test_ref="oval:org.mitre.oval:tst:38080"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37139"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37869"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37789"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37395"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38118"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:38072"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38037"/>
            <criterion comment="nspr is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37420"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37854"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.19-1.el5_2" test_ref="oval:org.mitre.oval:tst:38053"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37419"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38083"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:37631"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38114"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37737"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37403"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9812" version="5" class="vulnerability">
      <metadata>
        <title>libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281"/>
        <description>libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:20.837-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:17.819-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:24.968-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9812 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:01.796-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:27.333-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.5.10-11" test_ref="oval:org.mitre.oval:tst:37109"/>
            <criterion comment="libxml2-python is earlier than 0:2.5.10-11" test_ref="oval:org.mitre.oval:tst:37627"/>
            <criterion comment="libxml2 is earlier than 0:2.5.10-11" test_ref="oval:org.mitre.oval:tst:37621"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.16-12.3" test_ref="oval:org.mitre.oval:tst:36654"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.16-12.3" test_ref="oval:org.mitre.oval:tst:37135"/>
            <criterion comment="libxml2 is earlier than 0:2.6.16-12.3" test_ref="oval:org.mitre.oval:tst:37610"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.26-2.1.2.4" test_ref="oval:org.mitre.oval:tst:37604"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.26-2.1.2.4" test_ref="oval:org.mitre.oval:tst:37085"/>
            <criterion comment="libxml2 is earlier than 0:2.6.26-2.1.2.4" test_ref="oval:org.mitre.oval:tst:37551"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9811" version="5" class="vulnerability">
      <metadata>
        <title>Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0089"/>
        <description>The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:14.550-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:17.516-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:24.650-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9811 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:52.661-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:26.447-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.2.3-6.1" test_ref="oval:org.mitre.oval:tst:31354"/>
            <criterion comment="tkinter is earlier than 0:2.2.3-6.1" test_ref="oval:org.mitre.oval:tst:31195"/>
            <criterion comment="python-tools is earlier than 0:2.2.3-6.1" test_ref="oval:org.mitre.oval:tst:31366"/>
            <criterion comment="python is earlier than 0:2.2.3-6.1" test_ref="oval:org.mitre.oval:tst:31351"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.3.4-14.1" test_ref="oval:org.mitre.oval:tst:30896"/>
            <criterion comment="tkinter is earlier than 0:2.3.4-14.1" test_ref="oval:org.mitre.oval:tst:31368"/>
            <criterion comment="python-tools is earlier than 0:2.3.4-14.1" test_ref="oval:org.mitre.oval:tst:30806"/>
            <criterion comment="python is earlier than 0:2.3.4-14.1" test_ref="oval:org.mitre.oval:tst:31194"/>
            <criterion comment="python-docs is earlier than 0:2.3.4-14.1" test_ref="oval:org.mitre.oval:tst:30393"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9810" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185"/>
        <description>Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:16.557-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:17.233-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:24.374-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9810 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:38.777-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:26.009-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wget is earlier than 0:1.10.2-0.30E" test_ref="oval:org.mitre.oval:tst:32350"/>
            <criterion comment="curl-devel is earlier than 0:7.10.6-7.rhel3" test_ref="oval:org.mitre.oval:tst:32411"/>
            <criterion comment="curl is earlier than 0:7.10.6-7.rhel3" test_ref="oval:org.mitre.oval:tst:32351"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wget is earlier than 0:1.10.2-0.40E" test_ref="oval:org.mitre.oval:tst:32340"/>
            <criterion comment="curl-devel is earlier than 0:7.12.1-6.rhel4" test_ref="oval:org.mitre.oval:tst:32364"/>
            <criterion comment="curl is earlier than 0:7.12.1-6.rhel4" test_ref="oval:org.mitre.oval:tst:32423"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9808" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1316"/>
        <description>Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:51.836-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:16.602-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:23.672-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9808 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:02.927-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:25.227-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:31052"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:31079"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:31147"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:30749"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:31309"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:31267"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:30958"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:30815"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:31304"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.7" test_ref="oval:org.mitre.oval:tst:31266"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9807" version="5" class="vulnerability">
      <metadata>
        <title>The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1168"/>
        <description>The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:48.714-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:16.272-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:23.333-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9807 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:31.882-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:24.689-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="perl-suidperl is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:40554"/>
            <criterion comment="perl is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:40615"/>
            <criterion comment="perl-CPAN is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:39713"/>
            <criterion comment="perl-CGI is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:40065"/>
            <criterion comment="perl-DB_File is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:40367"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="perl-suidperl is earlier than 3:5.8.5-53.el4" test_ref="oval:org.mitre.oval:tst:40654"/>
            <criterion comment="perl is earlier than 3:5.8.5-53.el4" test_ref="oval:org.mitre.oval:tst:40417"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="perl-suidperl is earlier than 4:5.8.8-32.el5_5.1" test_ref="oval:org.mitre.oval:tst:40657"/>
            <criterion comment="perl is earlier than 4:5.8.8-32.el5_5.1" test_ref="oval:org.mitre.oval:tst:39926"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9805" version="5" class="vulnerability">
      <metadata>
        <title>cdrecord in the cdrtools package before 2.01, when installed setuid root, does not properly drop privileges before executing a program specified in the RSH environment variable, which allows local users to gain privileges.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0806"/>
        <description>cdrecord in the cdrtools package before 2.01, when installed setuid root, does not properly drop privileges before executing a program specified in the RSH environment variable, which allows local users to gain privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:11.466-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:15.744-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:22.779-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9805 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:40.186-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:23.934-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mkisofs is earlier than 8:2.01.0.a32-0.EL3.2" test_ref="oval:org.mitre.oval:tst:30433"/>
          <criterion comment="cdrecord is earlier than 8:2.01.0.a32-0.EL3.2" test_ref="oval:org.mitre.oval:tst:30490"/>
          <criterion comment="cdrtools is earlier than 8:2.01.0.a32-0.EL3.2" test_ref="oval:org.mitre.oval:tst:30552"/>
          <criterion comment="cdrecord-devel is earlier than 8:2.01.0.a32-0.EL3.2" test_ref="oval:org.mitre.oval:tst:30505"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9803" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote attackers to read arbitrary cookies via a crafted HTML document, as demonstrated by a URL with file://example.com/C:/ at the beginning.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835"/>
        <description>Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote attackers to read arbitrary cookies via a crafted HTML document, as demonstrated by a URL with file://example.com/C:/ at the beginning.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:18.299-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:14.731-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:21.767-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9803 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:00.481-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:22.636-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38336"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38452"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38736"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38742"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38069"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38264"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38724"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38791"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38432"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:37902"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.11-4.el4" test_ref="oval:org.mitre.oval:tst:38689"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38280"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38793"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38531"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38655"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38828"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38213"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38771"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38371"/>
            <criterion comment="firefox is earlier than 0:3.0.11-2.el5_3" test_ref="oval:org.mitre.oval:tst:38682"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38718"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9802" version="5" class="vulnerability">
      <metadata>
        <title>Net-SNMP before 5.0.9 allows a user or community to access data in MIB objects, even if that data is not allowed to be viewed.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0935"/>
        <description>Net-SNMP before 5.0.9 allows a user or community to access data in MIB objects, even if that data is not allowed to be viewed.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:55.937-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:14.524-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:21.535-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9802 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:16.267-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:22.348-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="net-snmp-utils is earlier than 0:5.0.9-2.30E.1" test_ref="oval:org.mitre.oval:tst:30617"/>
          <criterion comment="net-snmp is earlier than 0:5.0.9-2.30E.1" test_ref="oval:org.mitre.oval:tst:30534"/>
          <criterion comment="net-snmp-devel is earlier than 0:5.0.9-2.30E.1" test_ref="oval:org.mitre.oval:tst:30077"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9801" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0557"/>
        <description>Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:03.371-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:14.332-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:21.331-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9801 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:11.571-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:22.072-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="sox is earlier than 0:12.17.4-4.3" test_ref="oval:org.mitre.oval:tst:30502"/>
          <criterion comment="sox-devel is earlier than 0:12.17.4-4.3" test_ref="oval:org.mitre.oval:tst:30810"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:980" version="3" class="vulnerability">
      <metadata>
        <title>NTLM Authentication BO in Squid Web Proxy Cache</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0541"/>
        <description>Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected the local_port entity for a linux-def:inetlisteningservers_object.  Local_port was given a datatype of 'int'." date="2010-09-03T10:43:00.355-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-03T10:47:03.463-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:47.787-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="squid version is less than 2.5.STABLE3-6.3E" negate="false" test_ref="oval:org.mitre.oval:tst:1361"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="squid is listening on the network" negate="false" test_ref="oval:org.mitre.oval:tst:1360"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9798" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003"/>
        <description>Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:38.799-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:12.831-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:19.840-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9798 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:04.189-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:20.005-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33447"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33884"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33550"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33984"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33936"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33976"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33799"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33867"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33958"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33791"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33929"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33764"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33070"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33716"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33788"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33928"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33930"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33951"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33950"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33932"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33656"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33963"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33466"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33846"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33660"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33687"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33689"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33499"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33719"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33696"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33811"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33258"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33567"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33738"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33938"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33663"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33066"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33875"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33789"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33829"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33434"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33704"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33790"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33886"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33982"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33715"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33856"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33815"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-server-sdk is earlier than 0:1.1.1-48.13.0.1.el5" test_ref="oval:org.mitre.oval:tst:33470"/>
            <criterion comment="xorg-x11-server-Xnest is earlier than 0:1.1.1-48.13.0.1.el5" test_ref="oval:org.mitre.oval:tst:33864"/>
            <criterion comment="xorg-x11-server-Xvfb is earlier than 0:1.1.1-48.13.0.1.el5" test_ref="oval:org.mitre.oval:tst:33546"/>
            <criterion comment="xorg-x11-server-Xdmx is earlier than 0:1.1.1-48.13.0.1.el5" test_ref="oval:org.mitre.oval:tst:33718"/>
            <criterion comment="xorg-x11-server-Xephyr is earlier than 0:1.1.1-48.13.0.1.el5" test_ref="oval:org.mitre.oval:tst:33954"/>
            <criterion comment="xorg-x11-server is earlier than 0:1.1.1-48.13.0.1.el5" test_ref="oval:org.mitre.oval:tst:33629"/>
            <criterion comment="xorg-x11-server-Xorg is earlier than 0:1.1.1-48.13.0.1.el5" test_ref="oval:org.mitre.oval:tst:33876"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9797" version="5" class="vulnerability">
      <metadata>
        <title>zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758"/>
        <description>zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:03.149-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:12.526-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:19.525-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9797 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:26.391-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:19.557-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bzip2-devel is earlier than 0:1.0.2-11.EL3.4" test_ref="oval:org.mitre.oval:tst:31970"/>
            <criterion comment="bzip2 is earlier than 0:1.0.2-11.EL3.4" test_ref="oval:org.mitre.oval:tst:31944"/>
            <criterion comment="gzip is earlier than 0:1.3.3-12.rhel3" test_ref="oval:org.mitre.oval:tst:30880"/>
            <criterion comment="bzip2-libs is earlier than 0:1.0.2-11.EL3.4" test_ref="oval:org.mitre.oval:tst:31594"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bzip2-devel is earlier than 0:1.0.2-13.EL4.3" test_ref="oval:org.mitre.oval:tst:31440"/>
            <criterion comment="bzip2 is earlier than 0:1.0.2-13.EL4.3" test_ref="oval:org.mitre.oval:tst:31845"/>
            <criterion comment="gzip is earlier than 0:1.3.3-15.rhel4" test_ref="oval:org.mitre.oval:tst:31566"/>
            <criterion comment="bzip2-libs is earlier than 0:1.0.2-13.EL4.3" test_ref="oval:org.mitre.oval:tst:30992"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9795" version="5" class="vulnerability">
      <metadata>
        <title>Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1056"/>
        <description>Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:14.919-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:11.764-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:18.717-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9795 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:01.552-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:18.496-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30633"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31009"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30369"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30421"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30594"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30616"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9794" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960"/>
        <description>Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:26.912-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:11.231-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:18.167-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9794 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:19.554-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:17.760-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35246"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35338"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35812"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35754"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35763"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35809"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35651"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35146"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35423"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35775"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35664"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35628"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-7.el4" test_ref="oval:org.mitre.oval:tst:35520"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35267"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35702"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35858"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.8.el4" test_ref="oval:org.mitre.oval:tst:34811"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35523"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35602"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35697"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:34917"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-7.el5" test_ref="oval:org.mitre.oval:tst:35421"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-7.el5" test_ref="oval:org.mitre.oval:tst:35528"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-7.el5" test_ref="oval:org.mitre.oval:tst:35742"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9792" version="5" class="vulnerability">
      <metadata>
        <title>The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3799"/>
        <description>The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:08.940-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:10.000-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:16.944-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9792 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:29:42.907-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:16.284-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35216"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35012"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34787"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35164"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34818"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35171"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34820"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35008"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34796"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35363"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35010"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35249"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34683"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34365"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34976"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35087"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35298"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35289"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35309"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35263"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35279"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34964"/>
            <criterion comment="php-common is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34896"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35084"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35078"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34802"/>
            <criterion comment="php is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35270"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35361"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34769"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35108"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35037"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34943"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34689"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35221"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35077"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34934"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35170"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34376"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34764"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9791" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3984"/>
        <description>Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:18.312-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:09.523-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:16.447-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9791 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:09.990-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:15.561-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39610"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39451"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39678"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39628"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39624"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39524"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39588"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39651"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:38845"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39752"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.16-4.el4" test_ref="oval:org.mitre.oval:tst:39002"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39832"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39735"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39283"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39646"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39176"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39656"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.16-2.el5_4" test_ref="oval:org.mitre.oval:tst:39838"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.16-2.el5_4" test_ref="oval:org.mitre.oval:tst:39032"/>
            <criterion comment="firefox is earlier than 0:3.0.16-1.el5_4" test_ref="oval:org.mitre.oval:tst:39721"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.16-2.el5_4" test_ref="oval:org.mitre.oval:tst:39558"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9790" version="5" class="vulnerability">
      <metadata>
        <title>OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245"/>
        <description>OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:04.249-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:09.245-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:16.153-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9790 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:29:45.093-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:15.097-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="openssl096b is earlier than 0:0.9.6b-16.50" test_ref="oval:org.mitre.oval:tst:40235"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="openssl096b is earlier than 0:0.9.6b-22.46.el4_8.1" test_ref="oval:org.mitre.oval:tst:40149"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.8e-12.el5_4.6" test_ref="oval:org.mitre.oval:tst:39952"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.8e-12.el5_4.6" test_ref="oval:org.mitre.oval:tst:40361"/>
            <criterion comment="openssl is earlier than 0:0.9.8e-12.el5_4.6" test_ref="oval:org.mitre.oval:tst:40102"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:979" version="1" class="vulnerability">
      <metadata>
        <title>Utempter Directory Traversal Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0233"/>
        <description>Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="utempter version is less than 0.5.5-1.3EL.0" negate="false" test_ref="oval:org.mitre.oval:tst:1366"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="AND" comment="/usr/sbin/utempter is executable">
            <criterion comment="/usr/sbin/utempter is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1365"/>
            <criteria operator="OR" comment="/usr/sbin/utempter is executable">
              <criterion comment="/usr/sbin/utempter is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1364"/>
              <criterion comment="/usr/sbin/utempter is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1363"/>
              <criterion comment="/usr/sbin/utempter is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1362"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9787" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the rtl_allocateMemory function in sal/rtl/source/alloc_global.c in OpenOffice.org (OOo) 2.0 through 2.4 allows remote attackers to execute arbitrary code via a crafted file that triggers a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2152"/>
        <description>Integer overflow in the rtl_allocateMemory function in sal/rtl/source/alloc_global.c in OpenOffice.org (OOo) 2.0 through 2.4 allows remote attackers to execute arbitrary code via a crafted file that triggers a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:00.696-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:06.466-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:13.342-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9787 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:21.546-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:11.956-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-42.2.0.EL3" test_ref="oval:org.mitre.oval:tst:37041"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-42.2.0.EL3" test_ref="oval:org.mitre.oval:tst:37101"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-42.2.0.EL3" test_ref="oval:org.mitre.oval:tst:37231"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org2-langpack-lt_LT is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37131"/>
            <criterion comment="openoffice.org2-langpack-nn_NO is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36855"/>
            <criterion comment="openoffice.org2-langpack-ga_IE is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37023"/>
            <criterion comment="openoffice.org2-langpack-zh_CN is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37014"/>
            <criterion comment="openoffice.org2-javafilter is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36137"/>
            <criterion comment="openoffice.org2-langpack-he_IL is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36217"/>
            <criterion comment="openoffice.org2-draw is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37001"/>
            <criterion comment="openoffice.org2-langpack-ko_KR is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36763"/>
            <criterion comment="openoffice.org2-langpack-ca_ES is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36900"/>
            <criterion comment="openoffice.org2-base is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36904"/>
            <criterion comment="openoffice.org2-langpack-fr is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37102"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.5-10.6.0.5.EL4" test_ref="oval:org.mitre.oval:tst:37327"/>
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.5-10.6.0.5.EL4" test_ref="oval:org.mitre.oval:tst:37258"/>
            <criterion comment="openoffice.org2-langpack-pa_IN is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36971"/>
            <criterion comment="openoffice.org2-langpack-da_DK is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36698"/>
            <criterion comment="openoffice.org2-emailmerge is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37065"/>
            <criterion comment="openoffice.org2-langpack-pt_PT is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36143"/>
            <criterion comment="openoffice.org2-langpack-es is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37128"/>
            <criterion comment="openoffice.org2-langpack-sv is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37134"/>
            <criterion comment="openoffice.org2-langpack-ms_MY is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37093"/>
            <criterion comment="openoffice.org2-langpack-cs_CZ is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36815"/>
            <criterion comment="openoffice.org2-xsltfilter is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36342"/>
            <criterion comment="openoffice.org2-langpack-ja_JP is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37034"/>
            <criterion comment="openoffice.org2-langpack-hu_HU is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36655"/>
            <criterion comment="openoffice.org2-langpack-zh_TW is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36942"/>
            <criterion comment="openoffice.org2-langpack-sl_SI is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36897"/>
            <criterion comment="openoffice.org2-langpack-de is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37055"/>
            <criterion comment="openoffice.org2-pyuno is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37040"/>
            <criterion comment="openoffice.org2 is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37021"/>
            <criterion comment="openoffice.org2-langpack-tr_TR is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37103"/>
            <criterion comment="openoffice.org2-impress is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36121"/>
            <criterion comment="openoffice.org2-langpack-bn is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36947"/>
            <criterion comment="openoffice.org2-langpack-ar is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37015"/>
            <criterion comment="openoffice.org2-langpack-pt_BR is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37052"/>
            <criterion comment="openoffice.org2-langpack-af_ZA is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37077"/>
            <criterion comment="openoffice.org2-langpack-pl_PL is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36551"/>
            <criterion comment="openoffice.org2-calc is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37078"/>
            <criterion comment="openoffice.org2-langpack-zu_ZA is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36165"/>
            <criterion comment="openoffice.org2-langpack-fi_FI is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36997"/>
            <criterion comment="openoffice.org2-langpack-sk_SK is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37121"/>
            <criterion comment="openoffice.org2-langpack-hi_IN is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36911"/>
            <criterion comment="openoffice.org2-langpack-nb_NO is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36682"/>
            <criterion comment="openoffice.org2-langpack-th_TH is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36825"/>
            <criterion comment="openoffice.org2-langpack-et_EE is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36739"/>
            <criterion comment="openoffice.org2-langpack-gl_ES is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37097"/>
            <criterion comment="openoffice.org2-langpack-it is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36848"/>
            <criterion comment="openoffice.org2-langpack-hr_HR is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36841"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.5-10.6.0.5.EL4" test_ref="oval:org.mitre.oval:tst:37002"/>
            <criterion comment="openoffice.org2-langpack-ta_IN is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37142"/>
            <criterion comment="openoffice.org2-langpack-gu_IN is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36872"/>
            <criterion comment="openoffice.org2-testtools is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37122"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.5-10.6.0.5.EL4" test_ref="oval:org.mitre.oval:tst:36748"/>
            <criterion comment="openoffice.org2-langpack-eu_ES is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37004"/>
            <criterion comment="openoffice.org2-langpack-el_GR is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36830"/>
            <criterion comment="openoffice.org2-core is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36693"/>
            <criterion comment="openoffice.org2-langpack-ru is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36923"/>
            <criterion comment="openoffice.org2-langpack-bg_BG is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36982"/>
            <criterion comment="openoffice.org2-langpack-nl is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37080"/>
            <criterion comment="openoffice.org2-langpack-sr_CS is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:36346"/>
            <criterion comment="openoffice.org2-langpack-cy_GB is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37019"/>
            <criterion comment="openoffice.org2-math is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37076"/>
            <criterion comment="openoffice.org2-graphicfilter is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37072"/>
            <criterion comment="openoffice.org2-writer is earlier than 0:2.0.4-5.7.0.5.0" test_ref="oval:org.mitre.oval:tst:37088"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-langpack-sk_SK is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37166"/>
            <criterion comment="openoffice.org-langpack-zu_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37187"/>
            <criterion comment="openoffice.org-langpack-pa_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37170"/>
            <criterion comment="openoffice.org-langpack-hi_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37123"/>
            <criterion comment="openoffice.org-langpack-et_EE is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37214"/>
            <criterion comment="openoffice.org-langpack-kn_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37151"/>
            <criterion comment="openoffice.org is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37303"/>
            <criterion comment="openoffice.org-langpack-zh_TW is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37161"/>
            <criterion comment="openoffice.org-writer is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37011"/>
            <criterion comment="openoffice.org-langpack-ve_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36920"/>
            <criterion comment="openoffice.org-langpack-ga_IE is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37334"/>
            <criterion comment="openoffice.org-langpack-ta_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37136"/>
            <criterion comment="openoffice.org-langpack-ko_KR is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37183"/>
            <criterion comment="openoffice.org-langpack-or_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36862"/>
            <criterion comment="openoffice.org-langpack-da_DK is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36809"/>
            <criterion comment="openoffice.org-langpack-sr_CS is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37264"/>
            <criterion comment="openoffice.org-langpack-pl_PL is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37095"/>
            <criterion comment="openoffice.org-langpack-fr is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37090"/>
            <criterion comment="openoffice.org-langpack-ts_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37053"/>
            <criterion comment="openoffice.org-javafilter is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37308"/>
            <criterion comment="openoffice.org-langpack-as_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37009"/>
            <criterion comment="openoffice.org-testtools is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36832"/>
            <criterion comment="openoffice.org-langpack-hr_HR is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36882"/>
            <criterion comment="openoffice.org-langpack-de is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36676"/>
            <criterion comment="openoffice.org-emailmerge is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37216"/>
            <criterion comment="openoffice.org-xsltfilter is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37256"/>
            <criterion comment="openoffice.org-langpack-tn_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37150"/>
            <criterion comment="openoffice.org-langpack-te_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37062"/>
            <criterion comment="openoffice.org-langpack-sv is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37025"/>
            <criterion comment="openoffice.org-base is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37325"/>
            <criterion comment="openoffice.org-langpack-ca_ES is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36746"/>
            <criterion comment="openoffice.org-langpack-nr_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36993"/>
            <criterion comment="openoffice.org-core is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36901"/>
            <criterion comment="openoffice.org-langpack-nl is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37311"/>
            <criterion comment="openoffice.org-langpack-ur is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36621"/>
            <criterion comment="openoffice.org-langpack-nn_NO is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37298"/>
            <criterion comment="openoffice.org-langpack-ar is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37339"/>
            <criterion comment="openoffice.org-langpack-ja_JP is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37184"/>
            <criterion comment="openoffice.org-langpack-gu_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37220"/>
            <criterion comment="openoffice.org-langpack-tr_TR is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36497"/>
            <criterion comment="openoffice.org-langpack-eu_ES is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37147"/>
            <criterion comment="openoffice.org-langpack-fi_FI is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37270"/>
            <criterion comment="openoffice.org-graphicfilter is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37099"/>
            <criterion comment="openoffice.org-pyuno is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37278"/>
            <criterion comment="openoffice.org-langpack-ml_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37241"/>
            <criterion comment="openoffice.org-langpack-gl_ES is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37169"/>
            <criterion comment="openoffice.org-sdk-doc is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37338"/>
            <criterion comment="openoffice.org-langpack-zh_CN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36994"/>
            <criterion comment="openoffice.org-langpack-xh_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37310"/>
            <criterion comment="openoffice.org-langpack-it is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37137"/>
            <criterion comment="openoffice.org-sdk is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37110"/>
            <criterion comment="openoffice.org-langpack-es is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37194"/>
            <criterion comment="openoffice.org-langpack-nb_NO is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37221"/>
            <criterion comment="openoffice.org-langpack-sl_SI is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37030"/>
            <criterion comment="openoffice.org-draw is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37210"/>
            <criterion comment="openoffice.org-langpack-nso_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37130"/>
            <criterion comment="openoffice.org-langpack-ms_MY is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37324"/>
            <criterion comment="openoffice.org-langpack-el_GR is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37244"/>
            <criterion comment="openoffice.org-langpack-hu_HU is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37277"/>
            <criterion comment="openoffice.org-langpack-ss_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37175"/>
            <criterion comment="openoffice.org-langpack-bn is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36987"/>
            <criterion comment="openoffice.org-langpack-he_IL is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36625"/>
            <criterion comment="openoffice.org-langpack-pt_PT is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36795"/>
            <criterion comment="openoffice.org-langpack-lt_LT is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37168"/>
            <criterion comment="openoffice.org-langpack-af_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37329"/>
            <criterion comment="openoffice.org-langpack-bg_BG is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37177"/>
            <criterion comment="openoffice.org-calc is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37006"/>
            <criterion comment="openoffice.org-langpack-cs_CZ is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37132"/>
            <criterion comment="openoffice.org-langpack-cy_GB is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37116"/>
            <criterion comment="openoffice.org-langpack-mr_IN is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36675"/>
            <criterion comment="openoffice.org-headless is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37212"/>
            <criterion comment="openoffice.org-langpack-th_TH is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37235"/>
            <criterion comment="openoffice.org-langpack-pt_BR is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37042"/>
            <criterion comment="openoffice.org-langpack-ru is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37211"/>
            <criterion comment="openoffice.org-math is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37290"/>
            <criterion comment="openoffice.org-impress is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:36953"/>
            <criterion comment="openoffice.org-langpack-st_ZA is earlier than 0:2.3.0-6.5.1.el5_2" test_ref="oval:org.mitre.oval:tst:37186"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9786" version="5" class="vulnerability">
      <metadata>
        <title>Multiple "overflows" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1017"/>
        <description>Multiple "overflows" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:58.694-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:06.084-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:12.947-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9786 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:35.424-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:11.550-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:31101"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30944"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30205"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30752"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30999"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30940"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:31177"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30903"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30786"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9785" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767"/>
        <description>Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:44.759-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:05.731-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:12.611-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9785 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:36.607-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:11.015-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxslt-devel is earlier than 0:1.0.33-6" test_ref="oval:org.mitre.oval:tst:36611"/>
            <criterion comment="libxslt is earlier than 0:1.0.33-6" test_ref="oval:org.mitre.oval:tst:36656"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxslt-devel is earlier than 0:1.1.11-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36213"/>
            <criterion comment="libxslt-python is earlier than 0:1.1.11-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36777"/>
            <criterion comment="libxslt is earlier than 0:1.1.11-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36639"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxslt-devel is earlier than 0:1.1.17-2.el5_1.1" test_ref="oval:org.mitre.oval:tst:36716"/>
            <criterion comment="libxslt-python is earlier than 0:1.1.17-2.el5_1.1" test_ref="oval:org.mitre.oval:tst:36669"/>
            <criterion comment="libxslt is earlier than 0:1.1.17-2.el5_1.1" test_ref="oval:org.mitre.oval:tst:36648"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9784" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spoof DOM objects via an XBL control that implements an internal XPCOM interface.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2704"/>
        <description>Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spoof DOM objects via an XBL control that implements an internal XPCOM interface.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:54.727-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:05.238-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:12.107-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9784 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:40.755-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:10.386-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32169"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:31729"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32242"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32151"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32014"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32144"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32068"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32248"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32293"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32244"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32012"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:31897"/>
            <criterion comment="thunderbird is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:31477"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32300"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32226"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32289"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32170"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32150"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32302"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32090"/>
            <criterion comment="firefox is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:32147"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32209"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32088"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9783" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1111"/>
        <description>Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:18.907-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:04.980-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:11.812-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9783 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:29:52.866-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:09.996-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="cpio is earlier than 0:2.5-4.RHEL3" test_ref="oval:org.mitre.oval:tst:31643"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="cpio is earlier than 0:2.5-8.RHEL4" test_ref="oval:org.mitre.oval:tst:30793"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9782" version="5" class="vulnerability">
      <metadata>
        <title>The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions.  NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558"/>
        <description>The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions.  NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:09.833-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:04.090-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:10.847-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9782 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:51.507-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:08.786-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34409"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34257"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34432"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33988"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33721"/>
            <criterion comment="evolution is earlier than 0:1.4.5-20.el3" test_ref="oval:org.mitre.oval:tst:34258"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33693"/>
            <criterion comment="fetchmail is earlier than 0:6.2.0-3.el3.4" test_ref="oval:org.mitre.oval:tst:34132"/>
            <criterion comment="mutt is earlier than 5:1.4.1-5.el3" test_ref="oval:org.mitre.oval:tst:34296"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34313"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34228"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34281"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33894"/>
            <criterion comment="evolution-devel is earlier than 0:1.4.5-20.el3" test_ref="oval:org.mitre.oval:tst:33933"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33844"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34334"/>
            <criterion comment="irb is earlier than 0:1.8.1-7.el4_8.3" test_ref="oval:org.mitre.oval:tst:38549"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34366"/>
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:33625"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.1-7.el4_8.3" test_ref="oval:org.mitre.oval:tst:38591"/>
            <criterion comment="ruby-mode is earlier than 0:1.8.1-7.el4_8.3" test_ref="oval:org.mitre.oval:tst:38694"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33931"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.1-7.el4_8.3" test_ref="oval:org.mitre.oval:tst:38715"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.1.el4" test_ref="oval:org.mitre.oval:tst:34331"/>
            <criterion comment="ruby is earlier than 0:1.8.1-7.el4_8.3" test_ref="oval:org.mitre.oval:tst:38864"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.1-7.el4_8.3" test_ref="oval:org.mitre.oval:tst:38837"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34021"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34249"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:34293"/>
            <criterion comment="evolution is earlier than 0:2.0.2-35.0.2.el4" test_ref="oval:org.mitre.oval:tst:34046"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34446"/>
            <criterion comment="mutt is earlier than 5:1.4.1-12.0.3.el4" test_ref="oval:org.mitre.oval:tst:34260"/>
            <criterion comment="fetchmail is earlier than 0:6.2.5-6.0.1.el4" test_ref="oval:org.mitre.oval:tst:33955"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.1-7.el4_8.3" test_ref="oval:org.mitre.oval:tst:38523"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34262"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33994"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34322"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-35.0.2.el4" test_ref="oval:org.mitre.oval:tst:34116"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-ri is earlier than 0:1.8.5-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:38178"/>
            <criterion comment="ruby-mode is earlier than 0:1.8.5-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:38751"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.5-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:38045"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.5-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:38362"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:33979"/>
            <criterion comment="ruby is earlier than 0:1.8.5-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:38133"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.5-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:38911"/>
            <criterion comment="evolution-data-server-devel is earlier than 0:1.8.0-15.0.3.el5" test_ref="oval:org.mitre.oval:tst:33399"/>
            <criterion comment="evolution-data-server is earlier than 0:1.8.0-15.0.3.el5" test_ref="oval:org.mitre.oval:tst:34181"/>
            <criterion comment="fetchmail is earlier than 0:6.3.6-1.0.1.el5" test_ref="oval:org.mitre.oval:tst:34122"/>
            <criterion comment="mutt is earlier than 5:1.4.2.2-3.0.2.el5" test_ref="oval:org.mitre.oval:tst:34241"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.5-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:38738"/>
            <criterion comment="ruby-rdoc is earlier than 0:1.8.5-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:38762"/>
            <criterion comment="ruby-irb is earlier than 0:1.8.5-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:38574"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9781" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in Ethereal 0.10.4 up to 0.10.14 allows remote attackers to cause a denial of service (abort) via the SNDCP dissector.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1940"/>
        <description>Unspecified vulnerability in Ethereal 0.10.4 up to 0.10.14 allows remote attackers to cause a denial of service (abort) via the SNDCP dissector.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:46.501-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:03.782-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:10.189-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9781 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:08.739-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:08.398-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.99.0-EL3.2" test_ref="oval:org.mitre.oval:tst:32590"/>
            <criterion comment="ethereal is earlier than 0:0.99.0-EL3.2" test_ref="oval:org.mitre.oval:tst:32631"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.99.0-EL4.2" test_ref="oval:org.mitre.oval:tst:32299"/>
            <criterion comment="ethereal is earlier than 0:0.99.0-EL4.2" test_ref="oval:org.mitre.oval:tst:32238"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:978" version="1" class="vulnerability">
      <metadata>
        <title>Multiple Directory Traversal Vulnerabilities in LHA</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0235"/>
        <description>Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path").</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="lha version is less than 1.14i-10.2" negate="false" test_ref="oval:org.mitre.oval:tst:1370"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/bin/lha is executable">
            <criterion comment="/usr/bin/lha is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1369"/>
            <criterion comment="/usr/bin/lha is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1368"/>
            <criterion comment="/usr/bin/lha is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1367"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9779" version="5" class="vulnerability">
      <metadata>
        <title>The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0079"/>
        <description>The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:36.944-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:03.133-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:09.462-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9779 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:29.579-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:07.383-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.4" test_ref="oval:org.mitre.oval:tst:30638"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.4" test_ref="oval:org.mitre.oval:tst:30381"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-33.4" test_ref="oval:org.mitre.oval:tst:30673"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-16.42" test_ref="oval:org.mitre.oval:tst:32442"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="openssl096b is earlier than 0:0.9.6b-22.42" test_ref="oval:org.mitre.oval:tst:32297"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9778" version="5" class="vulnerability">
      <metadata>
        <title>The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166"/>
        <description>The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:25:26.782-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:02.500-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:08.764-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9778 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:52.541-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:06.554-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 1:2.02-14.el3" test_ref="oval:org.mitre.oval:tst:38322"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38126"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38230"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38481"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_7.4" test_ref="oval:org.mitre.oval:tst:38436"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38145"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="xpdf is earlier than 1:3.00-20.el4" test_ref="oval:org.mitre.oval:tst:38649"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38607"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38618"/>
            <criterion comment="cups-lpd is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38471"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40312"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38271"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38760"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40122"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38541"/>
            <criterion comment="tetex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40413"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40398"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38500"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40444"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38512"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:37935"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40008"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:39920"/>
            <criterion comment="cups is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38334"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9777" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties ("XHTML node spoofing").</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2269"/>
        <description>Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties ("XHTML node spoofing").</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:26.747-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:01.957-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:08.263-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9777 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:13.283-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:05.870-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32142"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32131"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32154"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32001"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32171"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32162"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31782"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32041"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32004"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31353"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32120"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31633"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31837"/>
            <criterion comment="thunderbird is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32113"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32100"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31821"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31904"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31814"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31951"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31554"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32149"/>
            <criterion comment="firefox is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32167"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31998"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32061"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9776" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667"/>
        <description>Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:33.447-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:14:00.716-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:07.360-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9776 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:22.930-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:04.731-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33447"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33884"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33550"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33984"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33936"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33976"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33799"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33867"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33958"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33791"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33929"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33764"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33070"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33716"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33788"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33928"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33930"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33951"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33950"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33932"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33656"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33963"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33466"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33846"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33660"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33687"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33689"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33499"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33719"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33696"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33811"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33258"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33567"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33738"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33938"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33663"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33066"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33875"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33789"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33829"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33434"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33704"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33790"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33886"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33982"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33715"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33856"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33815"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libX11-devel is earlier than 0:1.0.3-8.0.1.el5" test_ref="oval:org.mitre.oval:tst:33685"/>
            <criterion comment="libX11 is earlier than 0:1.0.3-8.0.1.el5" test_ref="oval:org.mitre.oval:tst:33774"/>
            <criterion comment="xorg-x11-apps is earlier than 0:7.1-4.0.1.el5" test_ref="oval:org.mitre.oval:tst:33082"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9773" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which leads to a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0619"/>
        <description>Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which leads to a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:03.655-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:59.908-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:06.446-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9773 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:12.790-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:03.166-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30934"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30708"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30577"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30874"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30794"/>
          <criterion comment="kernel is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30892"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30873"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:31080"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30866"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9770" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504"/>
        <description>Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:08.343-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:58.859-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:05.343-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9770 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:31.525-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:01.502-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36201"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36534"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36373"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36702"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36615"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36490"/>
            <criterion comment="kernel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36370"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:35738"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36249"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36731"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:35733"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:977" version="1" class="vulnerability">
      <metadata>
        <title>Multiple BO Vulnerabilities in LHA get_header Function</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0234"/>
        <description>Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="lha version is less than 1.14i-10.2" negate="false" test_ref="oval:org.mitre.oval:tst:1370"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/bin/lha is executable">
            <criterion comment="/usr/bin/lha is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1369"/>
            <criterion comment="/usr/bin/lha is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1368"/>
            <criterion comment="/usr/bin/lha is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1367"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9769" version="5" class="vulnerability">
      <metadata>
        <title>Ethereal 0.10.3 allows remote attackers to cause a denial of service (crash) via certain SIP messages between Hotsip servers and clients.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0504"/>
        <description>Ethereal 0.10.3 allows remote attackers to cause a denial of service (crash) via certain SIP messages between Hotsip servers and clients.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:23.486-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:58.610-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:05.136-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9769 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:40.217-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:01.222-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.10.3-0.30E.2" test_ref="oval:org.mitre.oval:tst:30484"/>
          <criterion comment="ethereal is earlier than 0:0.10.3-0.30E.2" test_ref="oval:org.mitre.oval:tst:30678"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9768" version="5" class="vulnerability">
      <metadata>
        <title>The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs.  NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784"/>
        <description>The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs.  NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:05.382-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:57.991-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:04.586-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9768 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:42.335-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:00.550-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32575"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32674"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32919"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32864"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32659"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32859"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32902"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32837"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9767" version="5" class="vulnerability">
      <metadata>
        <title>FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807"/>
        <description>FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:05.197-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:57.656-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:04.237-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9767 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:35.880-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:22:00.010-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.4-10.el3" test_ref="oval:org.mitre.oval:tst:36608"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.4-10.el3" test_ref="oval:org.mitre.oval:tst:36928"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.9-8.el4.6" test_ref="oval:org.mitre.oval:tst:36978"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.9-8.el4.6" test_ref="oval:org.mitre.oval:tst:37295"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.9-8.el4.6" test_ref="oval:org.mitre.oval:tst:36877"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.9-8.el4.6" test_ref="oval:org.mitre.oval:tst:37292"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.2.1-20.el5_2" test_ref="oval:org.mitre.oval:tst:37321"/>
            <criterion comment="freetype-demos is earlier than 0:2.2.1-20.el5_2" test_ref="oval:org.mitre.oval:tst:37312"/>
            <criterion comment="freetype-devel is earlier than 0:2.2.1-20.el5_2" test_ref="oval:org.mitre.oval:tst:37160"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9766" version="5" class="vulnerability">
      <metadata>
        <title>The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848"/>
        <description>The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:30.668-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:56.967-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:03.458-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9766 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:29.189-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:58.978-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39591"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39396"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39586"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39171"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39299"/>
            <criterion comment="kernel is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39151"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39468"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39460"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:38810"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39101"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39357"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:38568"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39331"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39316"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39054"/>
            <criterion comment="kernel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39274"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39407"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39435"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39442"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:38473"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:38255"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:38332"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:39122"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:39058"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:39247"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:39145"/>
            <criterion comment="kernel is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:38795"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:38831"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:38585"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:39130"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:38567"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-164.el5" test_ref="oval:org.mitre.oval:tst:39245"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9765" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456"/>
        <description>Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:25.674-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:56.647-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:03.132-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9765 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:32.791-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:58.509-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33189"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33318"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33102"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33080"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33315"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:33269"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:33326"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:32926"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:32622"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:33361"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9764" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web script or HTML via a crafted hyperlink in an HTML part of an e-mail message.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2379"/>
        <description>Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web script or HTML via a crafted hyperlink in an HTML part of an e-mail message.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:46.986-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:56.387-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:02.813-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9764 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:30.413-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:58.061-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-8.el3" test_ref="oval:org.mitre.oval:tst:38111"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-5.el4_7.2" test_ref="oval:org.mitre.oval:tst:37956"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-5.el5_2.2" test_ref="oval:org.mitre.oval:tst:37617"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9763" version="5" class="vulnerability">
      <metadata>
        <title>The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3511"/>
        <description>The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:36.301-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:55.813-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:02.280-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9763 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:27.518-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:57.318-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35512"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35540"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35394"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35541"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35553"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35552"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:34924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35155"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35441"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35489"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35324"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.5.el4" test_ref="oval:org.mitre.oval:tst:35240"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35182"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35311"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35454"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.7.el4" test_ref="oval:org.mitre.oval:tst:35398"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35351"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35482"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34790"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35291"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34577"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35262"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35202"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-5.el5" test_ref="oval:org.mitre.oval:tst:35177"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9762" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested option tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779"/>
        <description>Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested &lt;option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:18.092-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:55.326-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:01.673-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9762 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:45.580-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:56.655-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32575"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32674"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32919"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32864"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32659"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32859"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32902"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32837"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9761" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315"/>
        <description>Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:07.718-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:54.865-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:01.270-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9761 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:14.460-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:56.073-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38704"/>
            <criterion comment="tkinter is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38695"/>
            <criterion comment="python-tools is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38872"/>
            <criterion comment="python is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38617"/>
            <criterion comment="python-docs is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:37965"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38916"/>
            <criterion comment="tkinter is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38703"/>
            <criterion comment="python-tools is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38787"/>
            <criterion comment="python is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38939"/>
            <criterion comment="python-docs is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38081"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38889"/>
            <criterion comment="tkinter is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38958"/>
            <criterion comment="python-tools is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38827"/>
            <criterion comment="python is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38282"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9760" version="5" class="vulnerability">
      <metadata>
        <title>Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191"/>
        <description>Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:01.428-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:54.378-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:00.723-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9760 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:00.098-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:55.400-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32436"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32311"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32279"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.34" test_ref="oval:org.mitre.oval:tst:32490"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32507"/>
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.34" test_ref="oval:org.mitre.oval:tst:32463"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32377"/>
            <criterion comment="xpdf is earlier than 1:2.02-9.8" test_ref="oval:org.mitre.oval:tst:31474"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:31613"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.34" test_ref="oval:org.mitre.oval:tst:31538"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32260"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:32395"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32095"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:31805"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32489"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.9" test_ref="oval:org.mitre.oval:tst:31551"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32199"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.3" test_ref="oval:org.mitre.oval:tst:32230"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.9" test_ref="oval:org.mitre.oval:tst:32368"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32308"/>
            <criterion comment="xpdf is earlier than 1:3.00-11.10" test_ref="oval:org.mitre.oval:tst:32152"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32333"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32317"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.9" test_ref="oval:org.mitre.oval:tst:32431"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:976" version="1" class="vulnerability">
      <metadata>
        <title>tcpdump Identification Payload in ISAKMP Packets Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0184"/>
        <description>Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with an Identification payload with a length that becomes less than 8 during byte order conversion, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="tcpdump version is less than 3.7.2-7.E3.2" negate="false" test_ref="oval:org.mitre.oval:tst:1374"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/sbin/tcpdump is executable">
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1373"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1372"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1371"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9758" version="5" class="vulnerability">
      <metadata>
        <title>smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452"/>
        <description>smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:19.184-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:53.784-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:15:00.098-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9758 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:22.985-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:54.520-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.9-1.3E.12" test_ref="oval:org.mitre.oval:tst:33498"/>
            <criterion comment="samba-swat is earlier than 0:3.0.9-1.3E.12" test_ref="oval:org.mitre.oval:tst:32942"/>
            <criterion comment="samba-client is earlier than 0:3.0.9-1.3E.12" test_ref="oval:org.mitre.oval:tst:33319"/>
            <criterion comment="samba is earlier than 0:3.0.9-1.3E.12" test_ref="oval:org.mitre.oval:tst:33433"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.10-1.4E.11" test_ref="oval:org.mitre.oval:tst:32739"/>
            <criterion comment="samba-swat is earlier than 0:3.0.10-1.4E.11" test_ref="oval:org.mitre.oval:tst:33281"/>
            <criterion comment="samba-client is earlier than 0:3.0.10-1.4E.11" test_ref="oval:org.mitre.oval:tst:33449"/>
            <criterion comment="samba is earlier than 0:3.0.10-1.4E.11" test_ref="oval:org.mitre.oval:tst:33469"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.23c-2.el5.2" test_ref="oval:org.mitre.oval:tst:33413"/>
            <criterion comment="samba-swat is earlier than 0:3.0.23c-2.el5.2" test_ref="oval:org.mitre.oval:tst:33148"/>
            <criterion comment="samba-client is earlier than 0:3.0.23c-2.el5.2" test_ref="oval:org.mitre.oval:tst:33443"/>
            <criterion comment="samba is earlier than 0:3.0.23c-2.el5.2" test_ref="oval:org.mitre.oval:tst:33362"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9753" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809"/>
        <description>Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:19.804-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:52.136-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:58.334-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9753 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:41.076-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:52.444-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32342"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32877"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:31982"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32816"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32080"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32904"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32915"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32822"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32555"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9752" version="5" class="vulnerability">
      <metadata>
        <title>Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0976"/>
        <description>Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:20.928-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:51.854-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:58.088-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9752 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:08.292-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:52.119-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="perl-suidperl is earlier than 2:5.8.0-90.4" test_ref="oval:org.mitre.oval:tst:32422"/>
          <criterion comment="perl is earlier than 2:5.8.0-90.4" test_ref="oval:org.mitre.oval:tst:32487"/>
          <criterion comment="perl-CPAN is earlier than 2:1.61-90.4" test_ref="oval:org.mitre.oval:tst:32255"/>
          <criterion comment="perl-CGI is earlier than 2:2.89-90.4" test_ref="oval:org.mitre.oval:tst:32543"/>
          <criterion comment="perl-DB_File is earlier than 2:1.806-90.4" test_ref="oval:org.mitre.oval:tst:32488"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9751" version="5" class="vulnerability">
      <metadata>
        <title>The binfmt functionality in the Linux kernel, when "memory overcommit" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1074"/>
        <description>The binfmt functionality in the Linux kernel, when "memory overcommit" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:21.515-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:51.578-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:57.738-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9751 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:37.399-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:51.717-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31090"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31317"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31165"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31297"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31259"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:30906"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31029"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31014"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:30920"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9750" version="5" class="vulnerability">
      <metadata>
        <title>wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1488"/>
        <description>wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:41.780-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:51.361-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:57.506-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9750 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:05.438-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:51.364-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="wget is earlier than 0:1.10.1-1.30E.1" test_ref="oval:org.mitre.oval:tst:31680"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="wget is earlier than 0:1.10.1-2.4E.1" test_ref="oval:org.mitre.oval:tst:31717"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9749" version="5" class="vulnerability">
      <metadata>
        <title>A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0994"/>
        <description>A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:21.470-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:50.758-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:56.896-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9749 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:24.543-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:50.545-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33391"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33688"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33675"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33724"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33510"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33409"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33467"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33658"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33649"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33381"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:32760"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33554"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33648"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33712"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33705"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33379"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:33400"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:33759"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33678"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33695"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33697"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33244"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33645"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33461"/>
            <criterion comment="yelp is earlier than 0:2.16.0-14.0.1.el5" test_ref="oval:org.mitre.oval:tst:33761"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33744"/>
            <criterion comment="devhelp is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33415"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33616"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9748" version="5" class="vulnerability">
      <metadata>
        <title>The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276"/>
        <description>The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:10.717-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:50.364-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:56.491-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9748 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:29.513-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:49.951-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32345"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32444"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32109"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32476"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32343"/>
            <criterion comment="kernel is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:31877"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32362"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32190"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:31899"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32415"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32137"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32528"/>
            <criterion comment="kernel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:31866"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32446"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32450"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9747" version="5" class="vulnerability">
      <metadata>
        <title>Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0109"/>
        <description>Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:12.987-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:50.003-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:56.183-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9747 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:53:01.374-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:49.525-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.17" test_ref="oval:org.mitre.oval:tst:32376"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.17" test_ref="oval:org.mitre.oval:tst:32370"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-33.17" test_ref="oval:org.mitre.oval:tst:32357"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-16.22.4" test_ref="oval:org.mitre.oval:tst:32193"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-43.4" test_ref="oval:org.mitre.oval:tst:31576"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-43.4" test_ref="oval:org.mitre.oval:tst:31826"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-43.4" test_ref="oval:org.mitre.oval:tst:32196"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-22.4" test_ref="oval:org.mitre.oval:tst:32241"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9746" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to gain privileges and install malicious code via the watch Javascript function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501"/>
        <description>Unspecified vulnerability in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to gain privileges and install malicious code via the watch Javascript function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:14.895-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:49.515-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:55.625-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9746 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:06.247-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:48.711-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32785"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33227"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33266"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33146"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32352"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33183"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33095"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33300"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32996"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33263"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33195"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33229"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32844"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33273"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33259"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33239"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33284"/>
            <criterion comment="firefox is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32815"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33153"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33015"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33251"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33336"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32408"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9745" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows untrusted Javascript code to read and write to the clipboard, and possibly obtain sensitive information, via script-generated events such as Ctrl-Ins.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0908"/>
        <description>Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows untrusted Javascript code to read and write to the clipboard, and possibly obtain sensitive information, via script-generated events such as Ctrl-Ins.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:59.722-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:49.223-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:55.319-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9745 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:48.780-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:48.334-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30915"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30964"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30905"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30635"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:31000"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30111"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30762"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:31048"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30856"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30834"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9743" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the tiffdump utility for libtiff 3.7.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1183"/>
        <description>Integer overflow in the tiffdump utility for libtiff 3.7.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:57.439-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:48.723-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:54.788-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9743 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:01.351-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:47.616-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.5.7-22.el3" test_ref="oval:org.mitre.oval:tst:31219"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-22.el3" test_ref="oval:org.mitre.oval:tst:30876"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-8" test_ref="oval:org.mitre.oval:tst:31174"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-8" test_ref="oval:org.mitre.oval:tst:30884"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9740" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that tragger an assertion error related to unexpected length values.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574"/>
        <description>Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that tragger an assertion error related to unexpected length values.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:03.865-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:47.739-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:53.974-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9740 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:49.858-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:46.422-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.4-EL3.1" test_ref="oval:org.mitre.oval:tst:33205"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.4-EL3.1" test_ref="oval:org.mitre.oval:tst:33170"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.4-EL4.1" test_ref="oval:org.mitre.oval:tst:32550"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.4-EL4.1" test_ref="oval:org.mitre.oval:tst:33152"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9739" version="5" class="vulnerability">
      <metadata>
        <title>PostgreSQL 7.3 before 7.3.13, 7.4 before 7.4.16, 8.0 before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 allows attackers to disable certain checks for the data types of SQL function arguments, which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555"/>
        <description>PostgreSQL 7.3 before 7.3.13, 7.4 before 7.4.16, 8.0 before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 allows attackers to disable certain checks for the data types of SQL function arguments, which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:22.918-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:47.130-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:52.923-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9739 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:48.712-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:45.588-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33558"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33220"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33285"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33432"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33464"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33104"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33317"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33537"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33539"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33243"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33246"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33442"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33531"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33065"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32982"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33144"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33007"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33534"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33427"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33173"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33069"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33496"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33181"/>
            <criterion comment="postgresql-docs is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33488"/>
            <criterion comment="postgresql-pl is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33593"/>
            <criterion comment="postgresql-tcl is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33121"/>
            <criterion comment="postgresql-libs is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33568"/>
            <criterion comment="postgresql-contrib is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33396"/>
            <criterion comment="postgresql-python is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33603"/>
            <criterion comment="postgresql-test is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:32610"/>
            <criterion comment="postgresql-server is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:32997"/>
            <criterion comment="postgresql-devel is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33536"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9737" version="5" class="vulnerability">
      <metadata>
        <title>KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0164"/>
        <description>KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:26.406-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:46.573-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:52.396-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9737 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:39.224-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:44.817-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="ipsec-tools is earlier than 0:0.2.5-0.4" test_ref="oval:org.mitre.oval:tst:30611"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9736" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the SGI parser in ImageMagick before 6.0 allows remote attackers to execute arbitrary code via a crafted SGI image file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0762"/>
        <description>Heap-based buffer overflow in the SGI parser in ImageMagick before 6.0 allows remote attackers to execute arbitrary code via a crafted SGI image file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:30.604-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:46.345-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:52.156-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9736 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:26.567-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:44.505-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30471"/>
          <criterion comment="ImageMagick is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30355"/>
          <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30877"/>
          <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30918"/>
          <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30938"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9735" version="5" class="vulnerability">
      <metadata>
        <title>The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573"/>
        <description>The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:46.151-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:45.691-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:51.467-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9735 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:32.084-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:43.668-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-52.EL" test_ref="oval:org.mitre.oval:tst:34612"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-52.EL" test_ref="oval:org.mitre.oval:tst:35360"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-52.EL" test_ref="oval:org.mitre.oval:tst:35290"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-52.EL" test_ref="oval:org.mitre.oval:tst:35242"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-52.EL" test_ref="oval:org.mitre.oval:tst:35278"/>
            <criterion comment="kernel is earlier than 0:2.4.21-52.EL" test_ref="oval:org.mitre.oval:tst:35340"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-52.EL" test_ref="oval:org.mitre.oval:tst:34986"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-52.EL" test_ref="oval:org.mitre.oval:tst:35236"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-52.EL" test_ref="oval:org.mitre.oval:tst:35318"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:35329"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:35328"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:35371"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:35052"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:34704"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:35333"/>
            <criterion comment="kernel is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:35379"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:34761"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:35277"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:35265"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-55.0.9.EL" test_ref="oval:org.mitre.oval:tst:35040"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:35220"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:35380"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:34544"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:35347"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:35287"/>
            <criterion comment="kernel is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:34472"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:35307"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:34914"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:35213"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:34797"/>
            <criterion comment="kernel-debuginfo-common is earlier than 0:2.6.18-8.1.14.el5" test_ref="oval:org.mitre.oval:tst:35297"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9733" version="5" class="vulnerability">
      <metadata>
        <title>The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888"/>
        <description>The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:22.441-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:44.963-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:50.720-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9733 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:53:10.955-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:42.685-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="unzip is earlier than 0:5.50-36.EL3" test_ref="oval:org.mitre.oval:tst:36585"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9732" version="5" class="vulnerability">
      <metadata>
        <title>Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744"/>
        <description>Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:20.574-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:44.552-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:50.295-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9732 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:43.565-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:42.130-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32158"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32589"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32704"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32562"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32078"/>
            <criterion comment="kernel is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32513"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32231"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32097"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32708"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32235"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32371"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32703"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32314"/>
            <criterion comment="kernel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32614"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32295"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32310"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32611"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32305"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9730" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981"/>
        <description>Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:27.304-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:43.616-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:49.381-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9730 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:38.157-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:41.312-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33391"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33688"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33675"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33724"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33510"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33409"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33467"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33658"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33649"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33381"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:32760"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33554"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33648"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:32765"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33712"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33705"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33379"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:33400"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:33759"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33678"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33695"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33697"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33244"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33645"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33461"/>
            <criterion comment="yelp is earlier than 0:2.16.0-14.0.1.el5" test_ref="oval:org.mitre.oval:tst:33761"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33744"/>
            <criterion comment="devhelp is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33415"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33616"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-1.el5" test_ref="oval:org.mitre.oval:tst:33493"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9727" version="5" class="vulnerability">
      <metadata>
        <title>The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3857"/>
        <description>The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:13.802-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:42.478-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:48.199-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9727 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:01.558-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:40.320-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32525"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32366"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32381"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32215"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32464"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32288"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:31978"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32438"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32070"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32415"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32137"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32528"/>
            <criterion comment="kernel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:31866"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32446"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32450"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9726" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the ANSI MAP dissector for Wireshark (formerly Ethereal) 0.99.5 to 0.99.6, when running on unspecified platforms, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115"/>
        <description>Buffer overflow in the ANSI MAP dissector for Wireshark (formerly Ethereal) 0.99.5 to 0.99.6, when running on unspecified platforms, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:43.583-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:42.112-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:47.777-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9726 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:35.429-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:39.714-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:36051"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:35980"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35669"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:35709"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:36120"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35712"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35801"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9724" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658"/>
        <description>Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:05.665-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:41.136-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:46.762-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9724 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:46.798-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:38.176-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:38010"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37683"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37468"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37994"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37569"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37746"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37938"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38324"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38288"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38029"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:37974"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38154"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38499"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38401"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38018"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38505"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38494"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38075"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38387"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38058"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38202"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38147"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38305"/>
            <criterion comment="php-common is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38268"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38298"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37882"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37952"/>
            <criterion comment="php is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38099"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38415"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38511"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38115"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38367"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38569"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38440"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38536"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38507"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38316"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38493"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37667"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38421"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9723" version="6" class="vulnerability">
      <metadata>
        <title>The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstated by the (1) /admin?OP=redirectURL=% and (2) /admin?URL=/admin/OP=% URIs.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748"/>
        <description>The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:34.305-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:40.724-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:46.408-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9723 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:55.637-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:37.596-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.65" test_ref="oval:org.mitre.oval:tst:40547"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.65" test_ref="oval:org.mitre.oval:tst:40758"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.65" test_ref="oval:org.mitre.oval:tst:40348"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.32.el4_8.6" test_ref="oval:org.mitre.oval:tst:40606"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.32.el4_8.6" test_ref="oval:org.mitre.oval:tst:40609"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.32.el4_8.6" test_ref="oval:org.mitre.oval:tst:40697"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-lpd is earlier than 1:1.3.7-18.el5_5.4" test_ref="oval:org.mitre.oval:tst:40805"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-18.el5_5.4" test_ref="oval:org.mitre.oval:tst:40819"/>
            <criterion comment="cups is earlier than 1:1.3.7-18.el5_5.4" test_ref="oval:org.mitre.oval:tst:40803"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-18.el5_5.4" test_ref="oval:org.mitre.oval:tst:40393"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9722" version="5" class="vulnerability">
      <metadata>
        <title>Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909"/>
        <description>Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:01.285-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:39.971-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:45.626-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9722 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:20.800-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:36.622-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33459"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33371"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33748"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33090"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33419"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33665"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33475"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33282"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33636"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33548"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33156"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33407"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33562"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33500"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33725"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33105"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33501"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33691"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33662"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33087"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33640"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:32784"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33240"/>
            <criterion comment="php-common is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33527"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33617"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33561"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33385"/>
            <criterion comment="php is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33615"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33526"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33747"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33735"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33403"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33686"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33502"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33666"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33508"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33652"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33676"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33784"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33706"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9721" version="5" class="vulnerability">
      <metadata>
        <title>The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0635"/>
        <description>The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:44.142-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:39.766-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:45.419-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9721 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:42.487-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:36.335-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.10.5-0.30E.2" test_ref="oval:org.mitre.oval:tst:29799"/>
          <criterion comment="ethereal is earlier than 0:0.10.5-0.30E.2" test_ref="oval:org.mitre.oval:tst:30522"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9720" version="5" class="vulnerability">
      <metadata>
        <title>The bitsubstr function in backend/utils/adt/varbit.c in PostgreSQL 8.0.23, 8.1.11, and 8.3.8 allows remote authenticated users to cause a denial of service (daemon crash) or have unspecified other impact via vectors involving a negative integer in the third argument, as demonstrated by a SELECT statement that contains a call to the substring function for a bit string, related to an "overflow."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0442"/>
        <description>The bitsubstr function in backend/utils/adt/varbit.c in PostgreSQL 8.0.23, 8.1.11, and 8.3.8 allows remote authenticated users to cause a denial of service (daemon crash) or have unspecified other impact via vectors involving a negative integer in the third argument, as demonstrated by a SELECT statement that contains a call to the substring function for a bit string, related to an "overflow."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:29.228-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:39.164-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:44.765-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9720 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:59.782-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:35.507-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40180"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40440"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40426"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40220"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:39618"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40140"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40502"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:39925"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40137"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40551"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40106"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40486"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40521"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40292"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40516"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40066"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40399"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40512"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40314"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40428"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40366"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40465"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40401"/>
            <criterion comment="postgresql-docs is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40402"/>
            <criterion comment="postgresql-pl is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40538"/>
            <criterion comment="postgresql-tcl is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:39839"/>
            <criterion comment="postgresql-libs is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40515"/>
            <criterion comment="postgresql-contrib is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40505"/>
            <criterion comment="postgresql-python is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40251"/>
            <criterion comment="postgresql-test is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40253"/>
            <criterion comment="postgresql-server is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40509"/>
            <criterion comment="postgresql-devel is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40309"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:972" version="1" class="vulnerability">
      <metadata>
        <title>tcpdump Delete Payload in ISAKMP Packets Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0183"/>
        <description>TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via ISAKMP packets containing a Delete payload with a large number of SPI's, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-06-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-30T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-07-12T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="tcpdump version is less than 3.7.2-7.E3.2" negate="false" test_ref="oval:org.mitre.oval:tst:1374"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/sbin/tcpdump is executable">
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1373"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1372"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1371"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9719" version="5" class="vulnerability">
      <metadata>
        <title>Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-7234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7234"/>
        <description>Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:11.863-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:38.830-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:44.499-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9719 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:48.421-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:34.999-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-11.3" test_ref="oval:org.mitre.oval:tst:37424"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-18.2.el4_7.1" test_ref="oval:org.mitre.oval:tst:37925"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-28.1.el5_2.1" test_ref="oval:org.mitre.oval:tst:37898"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9716" version="5" class="vulnerability">
      <metadata>
        <title>agent/snmp_agent.c in snmpd in net-snmp 5.0.9 in Red Hat Enterprise Linux (RHEL) 3 allows remote attackers to cause a denial of service (daemon crash) via a crafted SNMP GETBULK request that triggers a divide-by-zero error.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-4309.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1887"/>
        <description>agent/snmp_agent.c in snmpd in net-snmp 5.0.9 in Red Hat Enterprise Linux (RHEL) 3 allows remote attackers to cause a denial of service (daemon crash) via a crafted SNMP GETBULK request that triggers a divide-by-zero error.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-4309.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:17.666-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:38.104-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:43.698-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9716 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:24.480-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:33.956-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="net-snmp-utils is earlier than 0:5.0.9-2.30E.28" test_ref="oval:org.mitre.oval:tst:38756"/>
          <criterion comment="net-snmp is earlier than 0:5.0.9-2.30E.28" test_ref="oval:org.mitre.oval:tst:38263"/>
          <criterion comment="net-snmp-libs is earlier than 0:5.0.9-2.30E.28" test_ref="oval:org.mitre.oval:tst:38869"/>
          <criterion comment="net-snmp-perl is earlier than 0:5.0.9-2.30E.28" test_ref="oval:org.mitre.oval:tst:38866"/>
          <criterion comment="net-snmp-devel is earlier than 0:5.0.9-2.30E.28" test_ref="oval:org.mitre.oval:tst:38753"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9714" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0888"/>
        <description>Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:38.808-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:37.126-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:42.676-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9714 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:10.645-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:32.792-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31559"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31693"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31615"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.16" test_ref="oval:org.mitre.oval:tst:30852"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31603"/>
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.16" test_ref="oval:org.mitre.oval:tst:31062"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31685"/>
            <criterion comment="xpdf is earlier than 1:2.02-9.3" test_ref="oval:org.mitre.oval:tst:31089"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31747"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.16" test_ref="oval:org.mitre.oval:tst:30949"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-3.3" test_ref="oval:org.mitre.oval:tst:31263"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-3.3" test_ref="oval:org.mitre.oval:tst:31323"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9713" version="5" class="vulnerability">
      <metadata>
        <title>Double free vulnerability in the ICEP dissector in Ethereal before 0.10.11 may allow remote attackers to execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1462"/>
        <description>Double free vulnerability in the ICEP dissector in Ethereal before 0.10.11 may allow remote attackers to execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:39.744-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:36.823-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:42.423-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9713 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:19.469-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:32.415-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9712" version="5" class="vulnerability">
      <metadata>
        <title>Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929"/>
        <description>Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:17.736-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:36.606-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:42.195-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9712 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:50.785-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:32.013-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-11.2" test_ref="oval:org.mitre.oval:tst:32358"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-18.2" test_ref="oval:org.mitre.oval:tst:32237"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9711" version="5" class="vulnerability">
      <metadata>
        <title>Squid Web Proxy Cache 2.5 might allow remote attackers to obtain sensitive information via URLs containing invalid hostnames that cause DNS operations to fail, which results in references to previously used error messages.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-2479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2479"/>
        <description>Squid Web Proxy Cache 2.5 might allow remote attackers to obtain sensitive information via URLs containing invalid hostnames that cause DNS operations to fail, which results in references to previously used error messages.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:33.643-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:36.391-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:41.919-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9711 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:52.444-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:31.665-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.14" test_ref="oval:org.mitre.oval:tst:32129"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.11" test_ref="oval:org.mitre.oval:tst:32053"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9710" version="5" class="vulnerability">
      <metadata>
        <title>Double free vulnerability in gtk 2 (gtk2) before 2.2.4 allows remote attackers to cause a denial of service (crash) via a crafted BMP image.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891"/>
        <description>Double free vulnerability in gtk 2 (gtk2) before 2.2.4 allows remote attackers to cause a denial of service (crash) via a crafted BMP image.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:45.459-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:36.080-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:41.609-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9710 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:26.457-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:31.220-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-12.el3" test_ref="oval:org.mitre.oval:tst:31425"/>
            <criterion comment="gtk2 is earlier than 0:2.2.4-15" test_ref="oval:org.mitre.oval:tst:31683"/>
            <criterion comment="gdk-pixbuf-gnome is earlier than 1:0.22.0-12.el3" test_ref="oval:org.mitre.oval:tst:31384"/>
            <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-12.el3" test_ref="oval:org.mitre.oval:tst:31449"/>
            <criterion comment="gtk2-devel is earlier than 0:2.2.4-15" test_ref="oval:org.mitre.oval:tst:31230"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-16.el4" test_ref="oval:org.mitre.oval:tst:31640"/>
            <criterion comment="gtk2 is earlier than 0:2.4.13-14" test_ref="oval:org.mitre.oval:tst:31176"/>
            <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-16.el4" test_ref="oval:org.mitre.oval:tst:31509"/>
            <criterion comment="gtk2-devel is earlier than 0:2.4.13-14" test_ref="oval:org.mitre.oval:tst:31725"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:971" version="2" class="vulnerability">
      <metadata>
        <title>libpng Malformed PNG Image Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0421"/>
        <description>The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-16T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-30T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:34.590-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:11.593-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criteria operator="OR" comment="libpng/libpng-devel is less than 1.2.2-21 or libpng10/libpng-devel less than 1.0.13 is installed">
          <criterion comment="libpng version is less than 1.2.2-21" negate="false" test_ref="oval:org.mitre.oval:tst:1378"/>
          <criterion comment="libpng-devel version is less than 1.2.2-21" negate="false" test_ref="oval:org.mitre.oval:tst:1377"/>
          <criterion comment="libpng10 version is less than 1.0.13-12" negate="false" test_ref="oval:org.mitre.oval:tst:1376"/>
          <criterion comment="libpng10-devel version is less than 1.0.13-12" negate="false" test_ref="oval:org.mitre.oval:tst:1375"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9708" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469"/>
        <description>Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:10.721-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:35.173-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:40.689-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9708 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:27.634-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:29.965-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31573"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31050"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31373"/>
            <criterion comment="telnet is earlier than 1:0.17-26.EL3.2" test_ref="oval:org.mitre.oval:tst:31054"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31472"/>
            <criterion comment="telnet-server is earlier than 1:0.17-26.EL3.2" test_ref="oval:org.mitre.oval:tst:31463"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31015"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:31409"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:30952"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:31575"/>
            <criterion comment="telnet is earlier than 1:0.17-31.EL4.2" test_ref="oval:org.mitre.oval:tst:31498"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:31481"/>
            <criterion comment="telnet-server is earlier than 1:0.17-31.EL4.2" test_ref="oval:org.mitre.oval:tst:31275"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:31526"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9707" version="5" class="vulnerability">
      <metadata>
        <title>Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0986"/>
        <description>Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:58.326-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:34.853-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:40.400-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9707 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:47.733-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:29.602-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30492"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30319"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30091"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30430"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30603"/>
          <criterion comment="kernel is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30486"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30341"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30477"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30442"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9704" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math, or (5) Writer, aka "File Format / Buffer Overflow Vulnerability."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3117"/>
        <description>Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math, or (5) Writer, aka "File Format / Buffer Overflow Vulnerability."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:37.580-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:34.169-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:39.624-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9704 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:56.365-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:27.994-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-34.2.0.EL3" test_ref="oval:org.mitre.oval:tst:32211"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-34.2.0.EL3" test_ref="oval:org.mitre.oval:tst:32773"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-34.2.0.EL3" test_ref="oval:org.mitre.oval:tst:31834"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32763"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32657"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32835"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32791"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9703" version="5" class="vulnerability">
      <metadata>
        <title>The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778"/>
        <description>The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:36.150-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:33.618-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:39.127-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9703 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:20.812-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:27.294-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32575"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32674"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32919"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32864"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32659"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32859"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32902"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32837"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9700" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unknown vulnerabilities in the (1) DHCP and (2) Telnet dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (abort).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1456"/>
        <description>Multiple unknown vulnerabilities in the (1) DHCP and (2) Telnet dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (abort).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:54.326-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:32.619-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:38.068-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9700 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:40.455-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:26.252-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:970" version="2" class="vulnerability">
      <metadata>
        <title>CVS pserver BO</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0396"/>
        <description>Heap-based buffer overflow in CVS 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7, when using the pserver mechanism allows remote attackers to execute arbitrary code via Entry lines.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-16T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-30T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:47.770-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:11.394-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="cvs version is less than 1.11.2-22" negate="false" test_ref="oval:org.mitre.oval:tst:1382"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/bin/cvs is executable">
            <criterion comment="/usr/bin/cvs is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1381"/>
            <criterion comment="/usr/bin/cvs is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1380"/>
            <criterion comment="/usr/bin/cvs is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1379"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9698" version="5" class="vulnerability">
      <metadata>
        <title>The isag utility, which processes sysstat data, allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CAN-2004-0107.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0108"/>
        <description>The isag utility, which processes sysstat data, allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CAN-2004-0107.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:26.007-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:32.240-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:37.642-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9698 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:38.440-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:25.638-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="sysstat is earlier than 0:4.0.7-4.EL3.2" test_ref="oval:org.mitre.oval:tst:30549"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9697" version="5" class="vulnerability">
      <metadata>
        <title>io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ before 2.8.7 allows attackers to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975"/>
        <description>io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ before 2.8.7 allows attackers to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:48.780-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:31.892-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:37.330-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9697 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:28.518-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:25.202-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-13.el3.3" test_ref="oval:org.mitre.oval:tst:32203"/>
            <criterion comment="gtk2 is earlier than 0:2.2.4-19" test_ref="oval:org.mitre.oval:tst:32214"/>
            <criterion comment="gdk-pixbuf-gnome is earlier than 1:0.22.0-13.el3.3" test_ref="oval:org.mitre.oval:tst:32393"/>
            <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-13.el3.3" test_ref="oval:org.mitre.oval:tst:32388"/>
            <criterion comment="gtk2-devel is earlier than 0:2.2.4-19" test_ref="oval:org.mitre.oval:tst:32156"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-17.el4.3" test_ref="oval:org.mitre.oval:tst:32239"/>
            <criterion comment="gtk2 is earlier than 0:2.4.13-18" test_ref="oval:org.mitre.oval:tst:32313"/>
            <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-17.el4.3" test_ref="oval:org.mitre.oval:tst:32331"/>
            <criterion comment="gtk2-devel is earlier than 0:2.4.13-18" test_ref="oval:org.mitre.oval:tst:32250"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9696" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent attackers to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1990"/>
        <description>Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent attackers to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:24.929-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:31.439-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:36.816-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9696 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:26.280-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:24.583-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-33.ent" test_ref="oval:org.mitre.oval:tst:32694"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-33.ent" test_ref="oval:org.mitre.oval:tst:32635"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-33.ent" test_ref="oval:org.mitre.oval:tst:32094"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-33.ent" test_ref="oval:org.mitre.oval:tst:32734"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-33.ent" test_ref="oval:org.mitre.oval:tst:32506"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-33.ent" test_ref="oval:org.mitre.oval:tst:32594"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-33.ent" test_ref="oval:org.mitre.oval:tst:32698"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32619"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32609"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:31938"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:31791"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32729"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32676"/>
            <criterion comment="php is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32607"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32412"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32084"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32271"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32269"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32783"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32718"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.15" test_ref="oval:org.mitre.oval:tst:32732"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9695" version="5" class="vulnerability">
      <metadata>
        <title>The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (crash) via unknown attack vectors that cause a null pointer dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0506"/>
        <description>The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (crash) via unknown attack vectors that cause a null pointer dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:22.750-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:31.141-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:36.603-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9695 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:29.845-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:24.309-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.10.3-0.30E.2" test_ref="oval:org.mitre.oval:tst:30484"/>
          <criterion comment="ethereal is earlier than 0:0.10.3-0.30E.2" test_ref="oval:org.mitre.oval:tst:30678"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9692" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed GTP MSISDN string.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0925"/>
        <description>Buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed GTP MSISDN string.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:19.414-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:30.394-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:35.785-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9692 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:17.751-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:23.703-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.9.16-0.30E.1" test_ref="oval:org.mitre.oval:tst:30378"/>
          <criterion comment="ethereal is earlier than 0:0.9.16-0.30E.1" test_ref="oval:org.mitre.oval:tst:29663"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9691" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the SOCKS dissector.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0927"/>
        <description>Heap-based buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the SOCKS dissector.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:09.998-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:30.198-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:35.581-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9691 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:08.788-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:23.427-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.9.16-0.30E.1" test_ref="oval:org.mitre.oval:tst:30378"/>
          <criterion comment="ethereal is earlier than 0:0.9.16-0.30E.1" test_ref="oval:org.mitre.oval:tst:29663"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9690" version="5" class="vulnerability">
      <metadata>
        <title>Multiple format string vulnerabilities in (1) qtextedit.cpp, (2) qdatatable.cpp, (3) qsqldatabase.cpp, (4) qsqlindex.cpp, (5) qsqlrecord.cpp, (6) qglobal.cpp, and (7) qsvgdevice.cpp in QTextEdit in Trolltech Qt 3 before 3.3.8 20070727 allow remote attackers to execute arbitrary code via format string specifiers in text used to compose an error message.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388"/>
        <description>Multiple format string vulnerabilities in (1) qtextedit.cpp, (2) qdatatable.cpp, (3) qsqldatabase.cpp, (4) qsqlindex.cpp, (5) qsqlrecord.cpp, (6) qglobal.cpp, and (7) qsvgdevice.cpp in QTextEdit in Trolltech Qt 3 before 3.3.8 20070727 allow remote attackers to execute arbitrary code via format string specifiers in text used to compose an error message.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:26.464-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:29.680-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:35.090-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9690 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:42.573-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:22.685-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="qt-config is earlier than 1:3.1.2-16.RHEL3" test_ref="oval:org.mitre.oval:tst:34378"/>
            <criterion comment="qt is earlier than 1:3.1.2-16.RHEL3" test_ref="oval:org.mitre.oval:tst:34752"/>
            <criterion comment="qt-devel is earlier than 1:3.1.2-16.RHEL3" test_ref="oval:org.mitre.oval:tst:34863"/>
            <criterion comment="qt-MySQL is earlier than 1:3.1.2-16.RHEL3" test_ref="oval:org.mitre.oval:tst:34860"/>
            <criterion comment="qt-ODBC is earlier than 1:3.1.2-16.RHEL3" test_ref="oval:org.mitre.oval:tst:34610"/>
            <criterion comment="qt-designer is earlier than 1:3.1.2-16.RHEL3" test_ref="oval:org.mitre.oval:tst:34657"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="qt-config is earlier than 1:3.3.3-11.RHEL4" test_ref="oval:org.mitre.oval:tst:34716"/>
            <criterion comment="qt is earlier than 1:3.3.3-11.RHEL4" test_ref="oval:org.mitre.oval:tst:34773"/>
            <criterion comment="qt-devel is earlier than 1:3.3.3-11.RHEL4" test_ref="oval:org.mitre.oval:tst:34824"/>
            <criterion comment="qt-PostgreSQL is earlier than 1:3.3.3-11.RHEL4" test_ref="oval:org.mitre.oval:tst:34273"/>
            <criterion comment="qt-MySQL is earlier than 1:3.3.3-11.RHEL4" test_ref="oval:org.mitre.oval:tst:34815"/>
            <criterion comment="qt-ODBC is earlier than 1:3.3.3-11.RHEL4" test_ref="oval:org.mitre.oval:tst:33935"/>
            <criterion comment="qt-designer is earlier than 1:3.3.3-11.RHEL4" test_ref="oval:org.mitre.oval:tst:34901"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="qt-config is earlier than 1:3.3.6-21.el5" test_ref="oval:org.mitre.oval:tst:34546"/>
            <criterion comment="qt is earlier than 1:3.3.6-21.el5" test_ref="oval:org.mitre.oval:tst:34540"/>
            <criterion comment="qt-MySQL is earlier than 1:3.3.6-21.el5" test_ref="oval:org.mitre.oval:tst:34891"/>
            <criterion comment="qt-ODBC is earlier than 1:3.3.6-21.el5" test_ref="oval:org.mitre.oval:tst:34751"/>
            <criterion comment="qt-designer is earlier than 1:3.3.6-21.el5" test_ref="oval:org.mitre.oval:tst:34786"/>
            <criterion comment="qt-devel is earlier than 1:3.3.6-21.el5" test_ref="oval:org.mitre.oval:tst:34503"/>
            <criterion comment="qt-PostgreSQL is earlier than 1:3.3.6-21.el5" test_ref="oval:org.mitre.oval:tst:34497"/>
            <criterion comment="qt-devel-docs is earlier than 1:3.3.6-21.el5" test_ref="oval:org.mitre.oval:tst:34823"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9688" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in CVS before 1.11.20 allows remote attackers to execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0753"/>
        <description>Buffer overflow in CVS before 1.11.20 allows remote attackers to execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:11.791-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:29.279-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:34.585-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9688 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:22.145-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:21.941-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="cvs is earlier than 0:1.11.2-27" test_ref="oval:org.mitre.oval:tst:31763"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="cvs is earlier than 0:1.11.17-7.RHEL4" test_ref="oval:org.mitre.oval:tst:31635"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9687" version="5" class="vulnerability">
      <metadata>
        <title>The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0739"/>
        <description>The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:59.277-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:28.974-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:34.333-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9687 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:24.517-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:21.568-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.10-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31514"/>
            <criterion comment="ethereal is earlier than 0:0.10.10-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31448"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.10-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31593"/>
            <criterion comment="ethereal is earlier than 0:0.10.10-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31548"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9686" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654"/>
        <description>Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:12.365-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:28.445-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:33.753-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9686 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:11.611-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:20.773-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39378"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39359"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39036"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39270"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39397"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39118"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:38444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39284"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:38466"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39389"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.5-1.el4_8" test_ref="oval:org.mitre.oval:tst:39088"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39081"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.5-1.el4_8" test_ref="oval:org.mitre.oval:tst:39351"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:38976"/>
            <criterion comment="firefox is earlier than 0:3.0.14-1.el4" test_ref="oval:org.mitre.oval:tst:39195"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39181"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39364"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39293"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39208"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39001"/>
            <criterion comment="nspr is earlier than 0:4.7.5-1.el5_4" test_ref="oval:org.mitre.oval:tst:39223"/>
            <criterion comment="firefox is earlier than 0:3.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39097"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.5-1.el5_4" test_ref="oval:org.mitre.oval:tst:39150"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39206"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9685" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451"/>
        <description>Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:39.866-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:28.073-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:33.379-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9685 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:17.088-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:20.220-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:36051"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:35980"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35669"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:35709"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:36120"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35712"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35801"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9683" version="5" class="vulnerability">
      <metadata>
        <title>The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181"/>
        <description>The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:48.539-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:26.928-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:32.319-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9683 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:34.932-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:19.399-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 1:2.02-14.el3" test_ref="oval:org.mitre.oval:tst:38322"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38126"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38230"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38481"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_7.4" test_ref="oval:org.mitre.oval:tst:38436"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38145"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="xpdf is earlier than 1:3.00-20.el4" test_ref="oval:org.mitre.oval:tst:38649"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38607"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38618"/>
            <criterion comment="cups-lpd is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38471"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40312"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38271"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38760"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40122"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38541"/>
            <criterion comment="tetex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40413"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40398"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38500"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40444"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38512"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:37935"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40008"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:39920"/>
            <criterion comment="cups is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38334"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9681" version="5" class="vulnerability">
      <metadata>
        <title>Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements which were linked as a parent and child," which are not properly handled during garbage collection.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0775"/>
        <description>Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements which were linked as a parent and child," which are not properly handled during garbage collection.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:29.793-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:25.977-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:31.332-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9681 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:02.799-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:17.908-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38413"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38419"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38110"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38217"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37995"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37833"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38347"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38410"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37953"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38386"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:37842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-19.el4" test_ref="oval:org.mitre.oval:tst:38238"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38355"/>
            <criterion comment="firefox is earlier than 0:3.0.7-1.el4" test_ref="oval:org.mitre.oval:tst:38405"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38148"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38132"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38204"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38364"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38168"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:37685"/>
            <criterion comment="firefox is earlier than 0:3.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38372"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.21-1.el5" test_ref="oval:org.mitre.oval:tst:37944"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38365"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9679" version="5" class="vulnerability">
      <metadata>
        <title>The XPConnect component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to (1) chrome XBL and (2) chrome JS.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4058"/>
        <description>The XPConnect component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to (1) chrome XBL and (2) chrome JS.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:10.182-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:25.190-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:30.480-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9679 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:10.432-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:16.789-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-16.el4" test_ref="oval:org.mitre.oval:tst:37634"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el4" test_ref="oval:org.mitre.oval:tst:37195"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37248"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37486"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37495"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37044"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.17-1.el5" test_ref="oval:org.mitre.oval:tst:37230"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37578"/>
            <criterion comment="yelp is earlier than 0:2.16.0-21.el5" test_ref="oval:org.mitre.oval:tst:37584"/>
            <criterion comment="devhelp is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37353"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37406"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el5" test_ref="oval:org.mitre.oval:tst:37225"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:36664"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37664"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9678" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the GTP dissector for Ethereal 0.9.1 to 0.10.13 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-4585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4585"/>
        <description>Unspecified vulnerability in the GTP dissector for Ethereal 0.9.1 to 0.10.13 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:30.846-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:24.897-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:30.217-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9678 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:00.352-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:16.395-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.14-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32303"/>
            <criterion comment="ethereal is earlier than 0:0.10.14-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32466"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.14-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32538"/>
            <criterion comment="ethereal is earlier than 0:0.10.14-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32039"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9677" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in wiretap/netscreen.c in Wireshark 0.99.7 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed NetScreen snoop file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599"/>
        <description>Buffer overflow in wiretap/netscreen.c in Wireshark 0.99.7 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed NetScreen snoop file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:28.592-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:24.609-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:29.839-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9677 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:13.623-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:15.886-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38023"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38321"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38000"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38041"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38236"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38085"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9676" version="5" class="vulnerability">
      <metadata>
        <title>Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0113"/>
        <description>Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:23.689-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:24.404-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:29.609-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9676 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:18.191-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:15.594-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-32.ent" test_ref="oval:org.mitre.oval:tst:30592"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-32.ent" test_ref="oval:org.mitre.oval:tst:30715"/>
          <criterion comment="httpd is earlier than 0:2.0.46-32.ent" test_ref="oval:org.mitre.oval:tst:30621"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9673" version="5" class="vulnerability">
      <metadata>
        <title>rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mount of a directory from a client whose reverse DNS lookup name is different from the forward lookup name.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0154"/>
        <description>rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mount of a directory from a client whose reverse DNS lookup name is different from the forward lookup name.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:18.385-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:23.539-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:28.723-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9673 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:35.649-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:14.429-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="nfs-utils is earlier than 0:1.0.6-7.EL" test_ref="oval:org.mitre.oval:tst:30663"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:967" version="2" class="vulnerability">
      <metadata>
        <title>rsync Path Sanitation Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0426"/>
        <description>rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-19T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-16T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-30T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:48.553-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:10.957-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criterion comment="rsync version is less than 2.5.7-4.3E" negate="false" test_ref="oval:org.mitre.oval:tst:1389"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9668" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808"/>
        <description>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:55.758-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:21.688-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:26.787-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9668 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:04.977-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:12.382-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37286"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37033"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37126"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37105"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37271"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37279"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37060"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37189"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36476"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36916"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37192"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-14.el4" test_ref="oval:org.mitre.oval:tst:36999"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36886"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37331"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36365"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.19.el4" test_ref="oval:org.mitre.oval:tst:37174"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37226"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36766"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36826"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37274"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37107"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:37351"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.16-1.el5" test_ref="oval:org.mitre.oval:tst:37363"/>
            <criterion comment="xulrunner is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36984"/>
            <criterion comment="devhelp is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37234"/>
            <criterion comment="yelp is earlier than 0:2.16.0-19.el5" test_ref="oval:org.mitre.oval:tst:37291"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36436"/>
            <criterion comment="firefox is earlier than 0:3.0-2.el5" test_ref="oval:org.mitre.oval:tst:36814"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9667" version="5" class="vulnerability">
      <metadata>
        <title>Array index error in the imageRotate function in PHP 5.2.8 and earlier allows context-dependent attackers to read the contents of arbitrary memory locations via a crafted value of the third argument (aka the bgd_color or clrBack argument) for an indexed image.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498"/>
        <description>Array index error in the imageRotate function in PHP 5.2.8 and earlier allows context-dependent attackers to read the contents of arbitrary memory locations via a crafted value of the third argument (aka the bgd_color or clrBack argument) for an indexed image.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:47.545-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:20.943-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:25.995-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9667 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:16.534-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:11.432-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:38010"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37683"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37468"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37994"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37569"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37746"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37938"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38324"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38288"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38029"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:37974"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38154"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38499"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38401"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38018"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38505"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38494"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38075"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38387"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38058"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38202"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38147"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38305"/>
            <criterion comment="php-common is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38268"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38298"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37882"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37952"/>
            <criterion comment="php is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38099"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38415"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38511"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38115"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38367"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38569"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38440"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38536"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38507"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38316"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38493"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37667"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38421"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9666" version="5" class="vulnerability">
      <metadata>
        <title>The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641"/>
        <description>The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:34.316-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:20.603-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:25.629-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9666 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:07.539-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:10.865-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.54" test_ref="oval:org.mitre.oval:tst:37294"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.54" test_ref="oval:org.mitre.oval:tst:37772"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.54" test_ref="oval:org.mitre.oval:tst:37394"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.1" test_ref="oval:org.mitre.oval:tst:37546"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.1" test_ref="oval:org.mitre.oval:tst:37714"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.1" test_ref="oval:org.mitre.oval:tst:37699"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-lpd is earlier than 1:1.2.4-11.18.el5_2.2" test_ref="oval:org.mitre.oval:tst:37215"/>
            <criterion comment="cups-devel is earlier than 1:1.2.4-11.18.el5_2.2" test_ref="oval:org.mitre.oval:tst:37378"/>
            <criterion comment="cups is earlier than 1:1.2.4-11.18.el5_2.2" test_ref="oval:org.mitre.oval:tst:37794"/>
            <criterion comment="cups-libs is earlier than 1:1.2.4-11.18.el5_2.2" test_ref="oval:org.mitre.oval:tst:37702"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9665" version="5" class="vulnerability">
      <metadata>
        <title>The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3244"/>
        <description>The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:40.827-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:20.362-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:25.369-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9665 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:12.804-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:10.492-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32189"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32138"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32341"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32202"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9664" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905"/>
        <description>Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:35.218-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:20.074-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:25.053-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9664 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:04.811-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:09.989-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="newt-devel is earlier than 0:0.51.5-2.el3" test_ref="oval:org.mitre.oval:tst:39137"/>
            <criterion comment="newt is earlier than 0:0.51.5-2.el3" test_ref="oval:org.mitre.oval:tst:39439"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="newt-devel is earlier than 0:0.51.6-10.el4_8.1" test_ref="oval:org.mitre.oval:tst:39340"/>
            <criterion comment="newt is earlier than 0:0.51.6-10.el4_8.1" test_ref="oval:org.mitre.oval:tst:39343"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="newt-devel is earlier than 0:0.52.2-12.el5_4.1" test_ref="oval:org.mitre.oval:tst:39387"/>
            <criterion comment="newt is earlier than 0:0.52.2-12.el5_4.1" test_ref="oval:org.mitre.oval:tst:38962"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9661" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in cscope 15.5 and earlier allow user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple vectors including (1) a long pathname that is not properly handled during file list parsing, (2) long pathnames that result from path variable expansion such as tilde expansion for the HOME environment variable, and (3) a long -f (aka reffile) command line argument.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4262"/>
        <description>Multiple buffer overflows in cscope 15.5 and earlier allow user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple vectors including (1) a long pathname that is not properly handled during file list parsing, (2) long pathnames that result from path variable expansion such as tilde expansion for the HOME environment variable, and (3) a long -f (aka reffile) command line argument.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:21.720-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:19.213-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:24.162-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9661 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:35.114-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:08.754-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="cscope is earlier than 0:15.5-16.RHEL3" test_ref="oval:org.mitre.oval:tst:38743"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="cscope is earlier than 0:15.5-10.RHEL4.3" test_ref="oval:org.mitre.oval:tst:38662"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9660" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5013"/>
        <description>Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:29.645-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:18.788-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:23.715-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9660 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:08.551-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:08.233-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9659" version="5" class="vulnerability">
      <metadata>
        <title>fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-4348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348"/>
        <description>fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:40.544-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:18.572-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:23.480-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9659 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:10.193-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:07.736-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.2.0-3.el3.3" test_ref="oval:org.mitre.oval:tst:33046"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.2.5-6.el4.5" test_ref="oval:org.mitre.oval:tst:33350"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9658" version="5" class="vulnerability">
      <metadata>
        <title>The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1184"/>
        <description>The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:18.437-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:18.349-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:23.245-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9658 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:46.788-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:07.373-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="enscript is earlier than 0:1.6.1-24.4" test_ref="oval:org.mitre.oval:tst:30796"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="enscript is earlier than 0:1.6.1-28.3" test_ref="oval:org.mitre.oval:tst:31274"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9657" version="5" class="vulnerability">
      <metadata>
        <title>Gaim 1.2.0 allows remote attackers to cause a denial of service (application crash) via a malformed file transfer request to a Jabber user, which leads to an out-of-bounds read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0967"/>
        <description>Gaim 1.2.0 allows remote attackers to cause a denial of service (application crash) via a malformed file transfer request to a Jabber user, which leads to an out-of-bounds read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:58.882-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:18.132-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:22.969-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9657 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:50.647-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:06.881-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.2.1-4.el3" test_ref="oval:org.mitre.oval:tst:31686"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.2.1-4.el4" test_ref="oval:org.mitre.oval:tst:31403"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9656" version="5" class="vulnerability">
      <metadata>
        <title>Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988"/>
        <description>Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:23.974-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:17.676-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:22.353-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9656 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:53.345-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:06.302-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36023"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36184"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36260"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36208"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36056"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36311"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36459"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36349"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35927"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36106"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36419"/>
            <criterion comment="ImageMagick is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36360"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36388"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:35921"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36133"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9654" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the NDPS dissector in Ethereal before 0.10.11 allows remote attackers to cause a denial of service (memory exhaustion) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1467"/>
        <description>Unknown vulnerability in the NDPS dissector in Ethereal before 0.10.11 allows remote attackers to cause a denial of service (memory exhaustion) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:39.939-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:16.840-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:21.722-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9654 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:37.931-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:05.487-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9651" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237"/>
        <description>Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:55.698-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:15.889-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:20.726-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9651 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:22.592-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:04.116-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36547"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36570"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36574"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35661"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36605"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35672"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35874"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36533"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36355"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36379"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36587"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:35752"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-10.el4" test_ref="oval:org.mitre.oval:tst:36259"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36586"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36333"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36500"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.14.el4" test_ref="oval:org.mitre.oval:tst:35884"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36540"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36602"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36557"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36221"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36566"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36305"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-11.el5_1" test_ref="oval:org.mitre.oval:tst:36619"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9650" version="5" class="vulnerability">
      <metadata>
        <title>The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0401"/>
        <description>FireFox 1.0.1 and Mozilla before 1.7.6 do not sufficiently address all attack vectors for loading chrome files and hijacking drag and drop events, which allows remote attackers to execute arbitrary XUL code by tricking a user into dragging a scrollbar, a variant of CVE-2005-0527, aka "Firescrolling 2."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:22.001-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:15.384-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:20.211-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9650 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:45.764-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:03.459-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30665"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31499"/>
            <criterion comment="mozilla is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31604"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31381"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31622"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30651"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31560"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31110"/>
            <criterion comment="evolution is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31003"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31404"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31375"/>
            <criterion comment="firefox is earlier than 0:1.0.2-1.4.1" test_ref="oval:org.mitre.oval:tst:31302"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31106"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31418"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31558"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9649" version="5" class="vulnerability">
      <metadata>
        <title>The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4342"/>
        <description>The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:35.508-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:15.104-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:19.865-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9649 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:38.372-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:03.096-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33074"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32633"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33103"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33001"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32937"/>
          <criterion comment="kernel is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32280"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33127"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32855"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33021"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9648" version="5" class="vulnerability">
      <metadata>
        <title>The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4814"/>
        <description>The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:22.505-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:14.645-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:19.433-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9648 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:07.524-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:02.479-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35915"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35794"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36513"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36264"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36161"/>
            <criterion comment="kernel is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36518"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36597"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36612"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36171"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33204"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33278"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33306"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:32378"/>
            <criterion comment="kernel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33145"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33107"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:32620"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:32645"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-42.0.8.EL" test_ref="oval:org.mitre.oval:tst:33057"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9647" version="5" class="vulnerability">
      <metadata>
        <title>The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2553"/>
        <description>The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:16.353-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:14.360-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:19.138-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9647 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:14.004-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:02.105-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
          <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9646" version="5" class="vulnerability">
      <metadata>
        <title>The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664"/>
        <description>The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:29.319-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:13.814-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:18.590-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9646 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:37.324-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:01.366-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:36968"/>
            <criterion comment="ruby-docs is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37000"/>
            <criterion comment="ruby-devel is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:36747"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37140"/>
            <criterion comment="ruby is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37342"/>
            <criterion comment="irb is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37252"/>
            <criterion comment="ruby-libs is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37305"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37171"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37242"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36569"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37296"/>
            <criterion comment="ruby is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36468"/>
            <criterion comment="irb is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36808"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37219"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-ri is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37199"/>
            <criterion comment="ruby-mode is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36604"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36516"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36870"/>
            <criterion comment="ruby is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36738"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37119"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37289"/>
            <criterion comment="ruby-irb is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37148"/>
            <criterion comment="ruby-rdoc is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37203"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9645" version="5" class="vulnerability">
      <metadata>
        <title>Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1165"/>
        <description>Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:33.502-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:13.548-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:18.310-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9645 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:31.530-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:21:00.881-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdebase is earlier than 6:3.1.3-5.8" test_ref="oval:org.mitre.oval:tst:31113"/>
            <criterion comment="kdebase-devel is earlier than 6:3.1.3-5.8" test_ref="oval:org.mitre.oval:tst:31092"/>
            <criterion comment="kdelibs is earlier than 6:3.1.3-6.9" test_ref="oval:org.mitre.oval:tst:30244"/>
            <criterion comment="kdelibs-devel is earlier than 6:3.1.3-6.9" test_ref="oval:org.mitre.oval:tst:30826"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdelibs is earlier than 6:3.3.1-3.3" test_ref="oval:org.mitre.oval:tst:31221"/>
            <criterion comment="kdelibs-devel is earlier than 6:3.3.1-3.3" test_ref="oval:org.mitre.oval:tst:30975"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9643" version="5" class="vulnerability">
      <metadata>
        <title>The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3835"/>
        <description>The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:58.351-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:12.714-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:17.442-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9643 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:23.890-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:59.773-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-16.el4" test_ref="oval:org.mitre.oval:tst:37634"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="thunderbird is earlier than 0:2.0.0.17-1.el5" test_ref="oval:org.mitre.oval:tst:37230"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9642" version="5" class="vulnerability">
      <metadata>
        <title>nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021"/>
        <description>nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:55.209-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:12.109-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:16.777-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9642 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:22.254-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:58.939-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-17.el4" test_ref="oval:org.mitre.oval:tst:37872"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.18-1.el5" test_ref="oval:org.mitre.oval:tst:38015"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9641" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274"/>
        <description>Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:58.227-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:11.501-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:16.210-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9641 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:12.067-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:58.197-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39570"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39466"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39720"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39691"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39583"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39280"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39727"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39575"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39724"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.6-1.el4_8" test_ref="oval:org.mitre.oval:tst:39525"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39481"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.6-1.el4_8" test_ref="oval:org.mitre.oval:tst:38755"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39675"/>
            <criterion comment="firefox is earlier than 0:3.0.15-3.el4" test_ref="oval:org.mitre.oval:tst:39710"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39683"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39031"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39547"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39753"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39602"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39541"/>
            <criterion comment="nspr is earlier than 0:4.7.6-1.el5_4" test_ref="oval:org.mitre.oval:tst:39168"/>
            <criterion comment="firefox is earlier than 0:3.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39294"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.6-1.el5_4" test_ref="oval:org.mitre.oval:tst:39579"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39636"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9640" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0468"/>
        <description>Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:52.520-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:11.141-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:15.765-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9640 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:34.936-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:57.484-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31573"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31050"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31373"/>
            <criterion comment="telnet is earlier than 1:0.17-26.EL3.2" test_ref="oval:org.mitre.oval:tst:31054"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31472"/>
            <criterion comment="telnet-server is earlier than 1:0.17-26.EL3.2" test_ref="oval:org.mitre.oval:tst:31463"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-42" test_ref="oval:org.mitre.oval:tst:31015"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:31409"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:30952"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:31575"/>
            <criterion comment="telnet is earlier than 1:0.17-31.EL4.2" test_ref="oval:org.mitre.oval:tst:31498"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:31481"/>
            <criterion comment="telnet-server is earlier than 1:0.17-31.EL4.2" test_ref="oval:org.mitre.oval:tst:31275"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-12" test_ref="oval:org.mitre.oval:tst:31526"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9639" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in shtool 2.0.1 and earlier allows local users to create or modify arbitrary files via a symlink attack on the .shtool.$$ temporary file, a different vulnerability than CVE-2005-1759.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1751"/>
        <description>Race condition in shtool 2.0.1 and earlier allows local users to create or modify arbitrary files via a symlink attack on the .shtool.$$ temporary file, a different vulnerability than CVE-2005-1759.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:12.818-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:10.629-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:15.296-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9639 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:47.453-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:56.852-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:31903"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:31997"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:32058"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:32011"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:31769"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:31610"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:32022"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31993"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31996"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:32047"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31303"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31718"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31829"/>
            <criterion comment="php is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31181"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:32064"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31623"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31882"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31988"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:32010"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31662"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31873"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9637" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) via a malformed JavaScript regular expression that ends with a backslash in an unterminated character set ("[\\"), which leads to a buffer over-read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566"/>
        <description>Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) via a malformed JavaScript regular expression that ends with a backslash in an unterminated character set ("[\\"), which leads to a buffer over-read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:17.073-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:09.831-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:14.486-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9637 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:15.289-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:55.807-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32759"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32989"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32809"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32779"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32954"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32668"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33010"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32811"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32981"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33061"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:32072"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33120"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32910"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32677"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32933"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32243"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:33062"/>
            <criterion comment="firefox is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32951"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32978"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33072"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33079"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32121"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33077"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9636" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in pdftops filter in CUPS in Red Hat Enterprise Linux 3 and 4, when running on 64-bit platforms, allows remote attackers to execute arbitrary code via a crafted PDF file.  NOTE: this issue is due to an incomplete fix for CVE-2004-0888.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1374"/>
        <description>Integer overflow in pdftops filter in CUPS in Red Hat Enterprise Linux 3 and 4, when running on 64-bit platforms, allows remote attackers to execute arbitrary code via a crafted PDF file.  NOTE: this issue is due to an incomplete fix for CVE-2004-0888.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:28.387-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:09.568-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:14.202-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9636 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:58.347-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:55.408-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.52" test_ref="oval:org.mitre.oval:tst:36146"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.52" test_ref="oval:org.mitre.oval:tst:36214"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.52" test_ref="oval:org.mitre.oval:tst:36403"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.20.2.el4_6.6" test_ref="oval:org.mitre.oval:tst:36474"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.20.2.el4_6.6" test_ref="oval:org.mitre.oval:tst:35913"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.20.2.el4_6.6" test_ref="oval:org.mitre.oval:tst:36036"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9634" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159"/>
        <description>Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:50.551-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:08.263-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:12.825-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9634 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:38.616-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:53.699-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="ntp is earlier than 0:4.1.2-6.el3" test_ref="oval:org.mitre.oval:tst:39300"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="ntp is earlier than 0:4.2.0.a.20040617-8.el4_7.2" test_ref="oval:org.mitre.oval:tst:38589"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="ntp is earlier than 0:4.2.2p1-9.el5_3.2" test_ref="oval:org.mitre.oval:tst:38719"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9633" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in Cscope before 15.7a allow remote attackers to execute arbitrary code via long strings in input such as (1) source-code tokens and (2) pathnames, related to integer overflows in some cases. NOTE: this issue exists because of an incomplete fix for CVE-2004-2541.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0148"/>
        <description>Multiple buffer overflows in Cscope before 15.7a allow remote attackers to execute arbitrary code via long strings in input such as (1) source-code tokens and (2) pathnames, related to integer overflows in some cases. NOTE: this issue exists because of an incomplete fix for CVE-2004-2541.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:48.722-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:07.962-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:12.554-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9633 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:30.994-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:53.267-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="cscope is earlier than 0:15.5-16.RHEL3" test_ref="oval:org.mitre.oval:tst:38743"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="cscope is earlier than 0:15.5-10.RHEL4.3" test_ref="oval:org.mitre.oval:tst:38662"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="cscope is earlier than 0:15.5-15.1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38706"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9632" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146"/>
        <description>Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:58.393-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:07.366-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:11.756-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9632 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:15.795-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:52.340-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 1:2.02-14.el3" test_ref="oval:org.mitre.oval:tst:38322"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38126"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38230"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38481"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_7.4" test_ref="oval:org.mitre.oval:tst:38436"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38145"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="xpdf is earlier than 1:3.00-20.el4" test_ref="oval:org.mitre.oval:tst:38649"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38607"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38618"/>
            <criterion comment="cups-lpd is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38471"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40312"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38271"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38760"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40122"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38541"/>
            <criterion comment="tetex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40413"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40398"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38500"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40444"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38512"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:37935"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40008"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:39920"/>
            <criterion comment="cups is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38334"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9631" version="5" class="vulnerability">
      <metadata>
        <title>The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949"/>
        <description>The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:10.975-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:06.986-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:11.407-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9631 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:49.651-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:51.784-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.62" test_ref="oval:org.mitre.oval:tst:38765"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.62" test_ref="oval:org.mitre.oval:tst:37797"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.62" test_ref="oval:org.mitre.oval:tst:38735"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.32.el4_8.3" test_ref="oval:org.mitre.oval:tst:38351"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.32.el4_8.3" test_ref="oval:org.mitre.oval:tst:38503"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.32.el4_8.3" test_ref="oval:org.mitre.oval:tst:38748"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-lpd is earlier than 1:1.3.7-8.el5_3.6" test_ref="oval:org.mitre.oval:tst:38713"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-8.el5_3.6" test_ref="oval:org.mitre.oval:tst:38764"/>
            <criterion comment="cups is earlier than 1:1.3.7-8.el5_3.6" test_ref="oval:org.mitre.oval:tst:38681"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-8.el5_3.6" test_ref="oval:org.mitre.oval:tst:38653"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9629" version="5" class="vulnerability">
      <metadata>
        <title>The WLCCP dissector in Wireshark 0.99.7 through 1.0.4 allows remote attackers to cause a denial of service (infinite loop) via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-6472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6472"/>
        <description>The WLCCP dissector in Wireshark 0.99.7 through 1.0.4 allows remote attackers to cause a denial of service (infinite loop) via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:57.215-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:06.089-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:10.553-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9629 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:54.445-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:50.613-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38023"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38321"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38000"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38041"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38236"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38085"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9628" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla 1.7.8, Firefox 1.0.4, Camino 0.8.4, Netscape 8.0.2, and K-Meleon 0.9, and possibly other products that use the Gecko engine, allow remote attackers to cause a denial of service (application crash) via JavaScript that repeatedly calls an empty function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2114"/>
        <description>Mozilla 1.7.8, Firefox 1.0.4, Camino 0.8.4, Netscape 8.0.2, and K-Meleon 0.9, and possibly other products that use the Gecko engine, allow remote attackers to cause a denial of service (application crash) via JavaScript that repeatedly calls an empty function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:45.537-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:05.549-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:10.068-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9628 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:17.225-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:49.964-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32142"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32131"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32154"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32001"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32171"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32162"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31782"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32041"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32004"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31353"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32120"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31633"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31837"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32100"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31821"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31904"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31814"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31951"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31554"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32149"/>
            <criterion comment="firefox is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32167"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31998"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32061"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9627" version="5" class="vulnerability">
      <metadata>
        <title>The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447"/>
        <description>The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:23.903-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:04.970-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:09.484-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9627 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:41.687-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:49.236-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bind-utils is earlier than 20:9.2.4-22.el3" test_ref="oval:org.mitre.oval:tst:37016"/>
            <criterion comment="bind-devel is earlier than 20:9.2.4-22.el3" test_ref="oval:org.mitre.oval:tst:37047"/>
            <criterion comment="bind-chroot is earlier than 20:9.2.4-22.el3" test_ref="oval:org.mitre.oval:tst:36733"/>
            <criterion comment="bind is earlier than 20:9.2.4-22.el3" test_ref="oval:org.mitre.oval:tst:36959"/>
            <criterion comment="bind-libs is earlier than 20:9.2.4-22.el3" test_ref="oval:org.mitre.oval:tst:37048"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bind-utils is earlier than 20:9.2.4-28.0.1.el4" test_ref="oval:org.mitre.oval:tst:36719"/>
            <criterion comment="bind-devel is earlier than 20:9.2.4-28.0.1.el4" test_ref="oval:org.mitre.oval:tst:36575"/>
            <criterion comment="bind-chroot is earlier than 20:9.2.4-28.0.1.el4" test_ref="oval:org.mitre.oval:tst:37082"/>
            <criterion comment="selinux-policy-targeted is earlier than 0:1.17.30-2.150.el4" test_ref="oval:org.mitre.oval:tst:36876"/>
            <criterion comment="selinux-policy-targeted-sources is earlier than 0:1.17.30-2.150.el4" test_ref="oval:org.mitre.oval:tst:37007"/>
            <criterion comment="bind is earlier than 20:9.2.4-28.0.1.el4" test_ref="oval:org.mitre.oval:tst:36100"/>
            <criterion comment="bind-libs is earlier than 20:9.2.4-28.0.1.el4" test_ref="oval:org.mitre.oval:tst:36925"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bind-libbind-devel is earlier than 30:9.3.4-6.0.2.P1.el5_2" test_ref="oval:org.mitre.oval:tst:37003"/>
            <criterion comment="bind-devel is earlier than 30:9.3.4-6.0.2.P1.el5_2" test_ref="oval:org.mitre.oval:tst:37017"/>
            <criterion comment="bind-chroot is earlier than 30:9.3.4-6.0.2.P1.el5_2" test_ref="oval:org.mitre.oval:tst:36924"/>
            <criterion comment="selinux-policy-targeted is earlier than 0:2.4.6-137.1.el5_2" test_ref="oval:org.mitre.oval:tst:37069"/>
            <criterion comment="dnsmasq is earlier than 0:2.45-1.el5_2.1" test_ref="oval:org.mitre.oval:tst:37588"/>
            <criterion comment="bind-sdb is earlier than 30:9.3.4-6.0.2.P1.el5_2" test_ref="oval:org.mitre.oval:tst:36601"/>
            <criterion comment="bind is earlier than 30:9.3.4-6.0.2.P1.el5_2" test_ref="oval:org.mitre.oval:tst:36960"/>
            <criterion comment="bind-utils is earlier than 30:9.3.4-6.0.2.P1.el5_2" test_ref="oval:org.mitre.oval:tst:36962"/>
            <criterion comment="selinux-policy-devel is earlier than 0:2.4.6-137.1.el5_2" test_ref="oval:org.mitre.oval:tst:36667"/>
            <criterion comment="caching-nameserver is earlier than 30:9.3.4-6.0.2.P1.el5_2" test_ref="oval:org.mitre.oval:tst:36806"/>
            <criterion comment="selinux-policy is earlier than 0:2.4.6-137.1.el5_2" test_ref="oval:org.mitre.oval:tst:36092"/>
            <criterion comment="bind-libs is earlier than 30:9.3.4-6.0.2.P1.el5_2" test_ref="oval:org.mitre.oval:tst:37038"/>
            <criterion comment="selinux-policy-strict is earlier than 0:2.4.6-137.1.el5_2" test_ref="oval:org.mitre.oval:tst:36853"/>
            <criterion comment="selinux-policy-mls is earlier than 0:2.4.6-137.1.el5_2" test_ref="oval:org.mitre.oval:tst:36790"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9626" version="5" class="vulnerability">
      <metadata>
        <title>Use-after-free vulnerability in the LiveConnect bridge code for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502"/>
        <description>Use-after-free vulnerability in the LiveConnect bridge code for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:40.379-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:04.480-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:08.922-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9626 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:02.219-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:48.096-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32785"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33227"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33266"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33146"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32352"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33183"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33095"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33300"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32996"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33263"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33195"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33229"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32844"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33273"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33259"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33239"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33284"/>
            <criterion comment="firefox is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32815"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33153"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33015"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33251"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33336"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32408"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9623" version="5" class="vulnerability">
      <metadata>
        <title>BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via a flood of recursive queries, which cause an INSIST failure when the response is received after the recursion queue is empty.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096"/>
        <description>BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via a flood of recursive queries, which cause an INSIST failure when the response is received after the recursion queue is empty.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:55.413-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:03.723-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:08.164-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9623 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:09.956-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:46.822-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bind-utils is earlier than 20:9.2.4-14_EL3" test_ref="oval:org.mitre.oval:tst:30151"/>
            <criterion comment="bind-devel is earlier than 20:9.2.4-14_EL3" test_ref="oval:org.mitre.oval:tst:30374"/>
            <criterion comment="bind-chroot is earlier than 20:9.2.4-14_EL3" test_ref="oval:org.mitre.oval:tst:30138"/>
            <criterion comment="bind is earlier than 20:9.2.4-14_EL3" test_ref="oval:org.mitre.oval:tst:29802"/>
            <criterion comment="bind-libs is earlier than 20:9.2.4-14_EL3" test_ref="oval:org.mitre.oval:tst:30540"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bind-utils is earlier than 20:9.2.4-16.EL4" test_ref="oval:org.mitre.oval:tst:30310"/>
            <criterion comment="bind-devel is earlier than 20:9.2.4-16.EL4" test_ref="oval:org.mitre.oval:tst:30454"/>
            <criterion comment="bind-chroot is earlier than 20:9.2.4-16.EL4" test_ref="oval:org.mitre.oval:tst:30510"/>
            <criterion comment="bind is earlier than 20:9.2.4-16.EL4" test_ref="oval:org.mitre.oval:tst:30416"/>
            <criterion comment="bind-libs is earlier than 20:9.2.4-16.EL4" test_ref="oval:org.mitre.oval:tst:30409"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9622" version="5" class="vulnerability">
      <metadata>
        <title>Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340"/>
        <description>Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:56.515-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:03.196-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:07.599-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9622 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:37.498-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:46.115-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35512"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35540"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35394"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35541"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35553"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35552"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:34924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35155"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35441"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35489"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35324"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.5.el4" test_ref="oval:org.mitre.oval:tst:35240"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35182"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35311"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35454"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.7.el4" test_ref="oval:org.mitre.oval:tst:35398"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35351"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35482"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34790"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35291"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34577"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35262"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35202"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-5.el5" test_ref="oval:org.mitre.oval:tst:35177"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9620" version="5" class="vulnerability">
      <metadata>
        <title>Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a denial of service (crash) via a packet with crafted zlib-compressed data that triggers an invalid read in the tvb_uncompress function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933"/>
        <description>Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a denial of service (crash) via a packet with crafted zlib-compressed data that triggers an invalid read in the tvb_uncompress function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:51.000-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:02.435-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:06.806-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9620 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:00.406-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:45.592-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37624"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37249"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37725"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37542"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37460"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9618" version="5" class="vulnerability">
      <metadata>
        <title>slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4600"/>
        <description>slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:53.371-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:01.349-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:06.164-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9618 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:57.699-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:44.642-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openldap-devel is earlier than 0:2.0.27-23" test_ref="oval:org.mitre.oval:tst:34514"/>
            <criterion comment="openldap-clients is earlier than 0:2.0.27-23" test_ref="oval:org.mitre.oval:tst:34458"/>
            <criterion comment="openldap is earlier than 0:2.0.27-23" test_ref="oval:org.mitre.oval:tst:34561"/>
            <criterion comment="openldap-servers is earlier than 0:2.0.27-23" test_ref="oval:org.mitre.oval:tst:33949"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="compat-openldap is earlier than 0:2.1.30-7.4E" test_ref="oval:org.mitre.oval:tst:33968"/>
            <criterion comment="openldap-devel is earlier than 0:2.2.13-7.4E" test_ref="oval:org.mitre.oval:tst:34054"/>
            <criterion comment="openldap-clients is earlier than 0:2.2.13-7.4E" test_ref="oval:org.mitre.oval:tst:34115"/>
            <criterion comment="openldap is earlier than 0:2.2.13-7.4E" test_ref="oval:org.mitre.oval:tst:34114"/>
            <criterion comment="openldap-servers-sql is earlier than 0:2.2.13-7.4E" test_ref="oval:org.mitre.oval:tst:34101"/>
            <criterion comment="openldap-servers is earlier than 0:2.2.13-7.4E" test_ref="oval:org.mitre.oval:tst:33882"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9617" version="5" class="vulnerability">
      <metadata>
        <title>Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and earlier, and 3.4.6 and earlier, allows user-assisted attackers to overwrite arbitrary files via a .jar file containing filenames with "../" sequences.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3619"/>
        <description>Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and earlier, and 3.4.6 and earlier, allows user-assisted attackers to overwrite arbitrary files via a .jar file containing filenames with "../" sequences.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:09.813-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:00.682-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:05.480-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9617 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:50.705-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:43.827-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gcc-ppc32 is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34573"/>
            <criterion comment="gcc-java is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34533"/>
            <criterion comment="gcc-g77 is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34680"/>
            <criterion comment="libgcj is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34364"/>
            <criterion comment="gcc-c++ is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34558"/>
            <criterion comment="libobjc is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34188"/>
            <criterion comment="libstdc++ is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34631"/>
            <criterion comment="libf2c is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34315"/>
            <criterion comment="gcc-c++-ppc32 is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34518"/>
            <criterion comment="gcc-objc is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34287"/>
            <criterion comment="libgnat is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34120"/>
            <criterion comment="libstdc++-devel is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34471"/>
            <criterion comment="gcc-gnat is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34329"/>
            <criterion comment="cpp is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34617"/>
            <criterion comment="libgcj-devel is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:33808"/>
            <criterion comment="gcc is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:34691"/>
            <criterion comment="libgcc is earlier than 0:3.2.3-59" test_ref="oval:org.mitre.oval:tst:33732"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gcc-ppc32 is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33781"/>
            <criterion comment="gcc-java is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33255"/>
            <criterion comment="gcc-g77 is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33431"/>
            <criterion comment="libgcj is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33641"/>
            <criterion comment="gcc-c++ is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33545"/>
            <criterion comment="libobjc is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33752"/>
            <criterion comment="libstdc++ is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:34001"/>
            <criterion comment="libf2c is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33787"/>
            <criterion comment="gcc-c++-ppc32 is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:34089"/>
            <criterion comment="gcc-objc is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33916"/>
            <criterion comment="libgnat is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33942"/>
            <criterion comment="libstdc++-devel is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:33437"/>
            <criterion comment="gcc-gnat is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:34105"/>
            <criterion comment="cpp is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:34086"/>
            <criterion comment="libgcj-devel is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:34100"/>
            <criterion comment="gcc is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:34111"/>
            <criterion comment="libgcc is earlier than 0:3.4.6-8" test_ref="oval:org.mitre.oval:tst:34014"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9616" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0102"/>
        <description>Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:08.344-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:13:00.432-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:05.220-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9616 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:56.892-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:43.443-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution is earlier than 0:1.4.5-14" test_ref="oval:org.mitre.oval:tst:31420"/>
            <criterion comment="evolution-devel is earlier than 0:1.4.5-14" test_ref="oval:org.mitre.oval:tst:30692"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution is earlier than 0:2.0.2-16" test_ref="oval:org.mitre.oval:tst:31620"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-16" test_ref="oval:org.mitre.oval:tst:31842"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9615" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2495"/>
        <description>Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:49.534-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:59.608-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:04.403-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9615 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:15.413-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:42.488-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31985"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31627"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31972"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31705"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31773"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31675"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:32017"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31942"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31963"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31156"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31574"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31905"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31784"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31310"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31908"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31949"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31827"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31806"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31649"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31020"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31743"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31721"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31883"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31764"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31959"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31843"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31616"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31732"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31371"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-95.EL" test_ref="oval:org.mitre.oval:tst:31803"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31419"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31188"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31835"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31397"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:30870"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31767"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31614"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31663"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31651"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31689"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31765"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31036"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:30807"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31179"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31491"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31427"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31761"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.13.16" test_ref="oval:org.mitre.oval:tst:31667"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9613" version="5" class="vulnerability">
      <metadata>
        <title>unshar (unshar.c) in sharutils 4.2.1 allows local users to overwrite arbitrary files via a symlink attack on the unsh.X temporary file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0990"/>
        <description>unshar (unshar.c) in sharutils 4.2.1 allows local users to overwrite arbitrary files via a symlink attack on the unsh.X temporary file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:22.778-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:59.101-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:03.826-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9613 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:19.894-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:41.672-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="sharutils is earlier than 0:4.2.1-16.2" test_ref="oval:org.mitre.oval:tst:31587"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="sharutils is earlier than 0:4.2.1-22.2" test_ref="oval:org.mitre.oval:tst:31528"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9612" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0083"/>
        <description>Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:37.688-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:58.510-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:03.293-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9612 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:01.474-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:41.055-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30567"/>
          <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30064"/>
          <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30460"/>
          <criterion comment="XFree86-libs is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:29952"/>
          <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30100"/>
          <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30258"/>
          <criterion comment="XFree86-twm is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30560"/>
          <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30714"/>
          <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30316"/>
          <criterion comment="XFree86-doc is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30669"/>
          <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:29808"/>
          <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:29998"/>
          <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30273"/>
          <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30537"/>
          <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:29649"/>
          <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30610"/>
          <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30489"/>
          <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30530"/>
          <criterion comment="XFree86-xdm is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30518"/>
          <criterion comment="XFree86 is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30588"/>
          <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30206"/>
          <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30113"/>
          <criterion comment="XFree86-xfs is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30525"/>
          <criterion comment="XFree86-tools is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30631"/>
          <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30636"/>
          <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30500"/>
          <criterion comment="XFree86-xauth is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30123"/>
          <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30593"/>
          <criterion comment="XFree86-devel is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30503"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9611" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802"/>
        <description>Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:41.250-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:57.979-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:02.759-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9611 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:40.461-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:40.399-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32342"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32877"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:31982"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32816"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32080"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32904"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32915"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32822"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32555"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9610" version="5" class="vulnerability">
      <metadata>
        <title>SQL injection vulnerability in the radius_xlat function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote authenticated users to execute arbitrary SQL commands via (1) group_membership_query, (2) simul_count_query, or (3) simul_verify_query configuration entries.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1454"/>
        <description>SQL injection vulnerability in the radius_xlat function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote authenticated users to execute arbitrary SQL commands via (1) group_membership_query, (2) simul_count_query, or (3) simul_verify_query configuration entries.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:11.283-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:57.719-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:02.495-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9610 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:19.612-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:39.941-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="freeradius is earlier than 0:1.0.1-1.1.RHEL3" test_ref="oval:org.mitre.oval:tst:31698"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freeradius-mysql is earlier than 0:1.0.1-3.RHEL4" test_ref="oval:org.mitre.oval:tst:32002"/>
            <criterion comment="freeradius-unixODBC is earlier than 0:1.0.1-3.RHEL4" test_ref="oval:org.mitre.oval:tst:31962"/>
            <criterion comment="freeradius is earlier than 0:1.0.1-3.RHEL4" test_ref="oval:org.mitre.oval:tst:31992"/>
            <criterion comment="freeradius-postgresql is earlier than 0:1.0.1-3.RHEL4" test_ref="oval:org.mitre.oval:tst:31999"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9609" version="5" class="vulnerability">
      <metadata>
        <title>The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0772"/>
        <description>The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:20.634-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:57.190-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:01.571-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9609 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:56.765-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:39.261-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38413"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38419"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38110"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38217"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37995"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37833"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38347"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38410"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37953"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38386"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:37842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-19.el4" test_ref="oval:org.mitre.oval:tst:38238"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38355"/>
            <criterion comment="firefox is earlier than 0:3.0.7-1.el4" test_ref="oval:org.mitre.oval:tst:38405"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38148"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38132"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38204"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38364"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38168"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:37685"/>
            <criterion comment="firefox is earlier than 0:3.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38372"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.21-1.el5" test_ref="oval:org.mitre.oval:tst:37944"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38365"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9608" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2871"/>
        <description>Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:03.463-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:56.553-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:01.088-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9608 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:55.287-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:38.577-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:31744"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32124"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32082"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32187"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32043"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32006"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32183"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32139"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:31801"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32194"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:32134"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:32161"/>
            <criterion comment="thunderbird is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:31477"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:32155"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:32024"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:31724"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:32126"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:31884"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:32021"/>
            <criterion comment="firefox is earlier than 0:1.0.6-1.4.2" test_ref="oval:org.mitre.oval:tst:32145"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:31660"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.4.2" test_ref="oval:org.mitre.oval:tst:32157"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9606" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725"/>
        <description>Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:21.744-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:55.744-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:14:00.236-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9606 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:06.662-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:37.531-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:36968"/>
            <criterion comment="ruby-docs is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37000"/>
            <criterion comment="ruby-devel is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:36747"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37140"/>
            <criterion comment="ruby is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37342"/>
            <criterion comment="irb is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37252"/>
            <criterion comment="ruby-libs is earlier than 0:1.6.8-12.el3" test_ref="oval:org.mitre.oval:tst:37305"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37171"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37242"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36569"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37296"/>
            <criterion comment="ruby is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36468"/>
            <criterion comment="irb is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:36808"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.1-7.el4_6.1" test_ref="oval:org.mitre.oval:tst:37219"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-ri is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37199"/>
            <criterion comment="ruby-mode is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36604"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36516"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36870"/>
            <criterion comment="ruby is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:36738"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37119"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37289"/>
            <criterion comment="ruby-irb is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37148"/>
            <criterion comment="ruby-rdoc is earlier than 0:1.8.5-5.el5_2.3" test_ref="oval:org.mitre.oval:tst:37203"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9605" version="5" class="vulnerability">
      <metadata>
        <title>packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680"/>
        <description>packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:25:09.474-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:55.446-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:59.893-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9605 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:13.502-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:36.826-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38023"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38321"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38000"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38041"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38236"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38085"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9604" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are called without any arguments, which allows remote attackers to conduct cross-site scripting (XSS) attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731"/>
        <description>Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are called without any arguments, which allows remote attackers to conduct cross-site scripting (XSS) attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:26.455-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:54.903-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:59.390-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9604 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:08.087-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:36.196-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9601" version="5" class="vulnerability">
      <metadata>
        <title>tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1279"/>
        <description>tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:01.848-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:54.175-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:58.577-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9601 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:20.339-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:34.728-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libpcap is earlier than 14:0.7.2-7.E3.5" test_ref="oval:org.mitre.oval:tst:31652"/>
            <criterion comment="tcpdump is earlier than 14:3.7.2-7.E3.5" test_ref="oval:org.mitre.oval:tst:31836"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="arpwatch is earlier than 14:2.1a13-9.RHEL4" test_ref="oval:org.mitre.oval:tst:31864"/>
            <criterion comment="libpcap is earlier than 14:0.8.3-9.RHEL4" test_ref="oval:org.mitre.oval:tst:30922"/>
            <criterion comment="tcpdump is earlier than 14:3.8.2-9.RHEL4" test_ref="oval:org.mitre.oval:tst:31788"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:960" version="1" class="vulnerability">
      <metadata>
        <title>Magick XWD Decoder DoS</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>ImageMagick</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1739"/>
        <description>The XWD Decoder in ImageMagick before 6.2.2.3, and GraphicsMagick before 1.1.6-r1, allows remote attackers to cause a denial of service (infinite loop) via an image with a zero color mask.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-11T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ImageMagick RPM earlier than 0:5.5.6-15" negate="false" test_ref="oval:org.mitre.oval:tst:1397"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9598" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the GSM dissector in Ethereal before 0.10.11 allows remote attackers to cause the dissector to access an invalid pointer.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1469"/>
        <description>Unknown vulnerability in the GSM dissector in Ethereal before 0.10.11 allows remote attackers to cause the dissector to access an invalid pointer.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:11.437-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:53.117-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:57.517-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9598 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:52.826-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:33.238-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9597" version="5" class="vulnerability">
      <metadata>
        <title>PHP 4.4.x before 4.4.9, and 5.x through 5.2.6, when used as a FastCGI module, allows remote attackers to cause a denial of service (crash) via a request with multiple dots preceding the extension, as demonstrated using foo..php.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3660"/>
        <description>PHP 4.4.x before 4.4.9, and 5.x through 5.2.6, when used as a FastCGI module, allows remote attackers to cause a denial of service (crash) via a request with multiple dots preceding the extension, as demonstrated using foo..php.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:20.548-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:52.368-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:56.743-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9597 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:02.456-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:32.305-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:38010"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37683"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37468"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37994"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37569"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37746"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37938"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38324"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38288"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38029"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:37974"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38154"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38499"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38401"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38018"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38505"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38494"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38075"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38387"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38058"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38202"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38147"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38305"/>
            <criterion comment="php-common is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38268"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38298"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37882"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37952"/>
            <criterion comment="php is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38099"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38415"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38511"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38115"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38367"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38569"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38440"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38536"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38507"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38316"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38493"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37667"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38421"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9596" version="5" class="vulnerability">
      <metadata>
        <title>zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable's value to be used in security-relevant operations.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0205"/>
        <description>KPPP 2.1.2 in KDE 3.1.5 and earlier, when setuid root without certain wrappers, does not properly close a privileged file descriptor for a domain socket, which allows local users to read and write to /etc/hosts and /etc/resolv.conf and gain control over DNS name resolution by opening a number of file descriptors before executing kppp.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:02.551-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:52.167-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:56.528-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9596 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:25.628-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:31.920-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kdenetwork-devel is earlier than 7:3.1.3-1.8" test_ref="oval:org.mitre.oval:tst:31423"/>
          <criterion comment="kdenetwork is earlier than 7:3.1.3-1.8" test_ref="oval:org.mitre.oval:tst:31376"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9595" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the extract_one function from lhext.c in LHA may allow attackers to execute arbitrary code via a long w (working directory) command line option, a different issue than CVE-2004-0769. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0771"/>
        <description>Buffer overflow in the extract_one function from lhext.c in LHA may allow attackers to execute arbitrary code via a long w (working directory) command line option, a different issue than CVE-2004-0769. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:32.334-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:51.903-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:56.336-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9595 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:43.422-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:31.659-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="lha is earlier than 0:1.14i-10.4" test_ref="oval:org.mitre.oval:tst:29793"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9593" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810"/>
        <description>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:35.710-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:51.001-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:55.415-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9593 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:30.638-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:30.447-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37286"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37033"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37126"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37105"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37271"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37279"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37060"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37189"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36476"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36916"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37192"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-14.el4" test_ref="oval:org.mitre.oval:tst:36999"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36886"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37331"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36365"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.19.el4" test_ref="oval:org.mitre.oval:tst:37174"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37226"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36766"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36826"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37274"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37107"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:37351"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.16-1.el5" test_ref="oval:org.mitre.oval:tst:37363"/>
            <criterion comment="xulrunner is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36984"/>
            <criterion comment="devhelp is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37234"/>
            <criterion comment="yelp is earlier than 0:2.16.0-19.el5" test_ref="oval:org.mitre.oval:tst:37291"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36436"/>
            <criterion comment="firefox is earlier than 0:3.0-2.el5" test_ref="oval:org.mitre.oval:tst:36814"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9592" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1036" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1036"/>
        <description>Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:50.850-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:50.814-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:55.221-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9592 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:40.352-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:30.176-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="squirrelmail is earlier than 0:1.4.3a-7.EL3" test_ref="oval:org.mitre.oval:tst:30184"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9591" version="5" class="vulnerability">
      <metadata>
        <title>MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0711"/>
        <description>MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:49.680-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:50.196-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:54.880-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9591 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:06.049-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:29.679-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mysql is earlier than 0:3.23.58-15.RHEL3.1" test_ref="oval:org.mitre.oval:tst:31367"/>
            <criterion comment="mysql-devel is earlier than 0:3.23.58-15.RHEL3.1" test_ref="oval:org.mitre.oval:tst:31299"/>
            <criterion comment="mysql-bench is earlier than 0:3.23.58-15.RHEL3.1" test_ref="oval:org.mitre.oval:tst:31391"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mysql is earlier than 0:4.1.10a-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:30977"/>
            <criterion comment="mysql-devel is earlier than 0:4.1.10a-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31612"/>
            <criterion comment="mysql-bench is earlier than 0:4.1.10a-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31452"/>
            <criterion comment="mysql-server is earlier than 0:4.1.10a-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31294"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9590" version="5" class="vulnerability">
      <metadata>
        <title>The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159"/>
        <description>The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:17.168-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:49.635-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:54.363-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9590 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:08.452-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:28.950-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39910"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40282"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40001"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40160"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39327"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39963"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39749"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40277"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39865"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40145"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40087"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40185"/>
            <criterion comment="firefox is earlier than 0:3.0.18-1.el4" test_ref="oval:org.mitre.oval:tst:39897"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40258"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40130"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40147"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40264"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:39323"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:40174"/>
            <criterion comment="firefox is earlier than 0:3.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:40301"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:39533"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9589" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1268"/>
        <description>Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:18.301-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:49.339-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:54.047-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9589 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:49.121-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:28.525-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-46.2.ent" test_ref="oval:org.mitre.oval:tst:31786"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.46-46.2.ent" test_ref="oval:org.mitre.oval:tst:31975"/>
            <criterion comment="httpd is earlier than 0:2.0.46-46.2.ent" test_ref="oval:org.mitre.oval:tst:31650"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:31790"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:31890"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:31948"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:31906"/>
            <criterion comment="httpd is earlier than 0:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:32146"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9588" version="5" class="vulnerability">
      <metadata>
        <title>The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0809"/>
        <description>The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:32.057-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:49.134-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:53.796-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9588 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:24.962-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:28.229-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30894"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30928"/>
          <criterion comment="httpd is earlier than 0:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30979"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9587" version="5" class="vulnerability">
      <metadata>
        <title>prefs.php in SquirrelMail before 1.4.4, with register_globals enabled, allows remote attackers to inject local code into the SquirrelMail code via custom preference handlers.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0075"/>
        <description>prefs.php in SquirrelMail before 1.4.4, with register_globals enabled, allows remote attackers to inject local code into the SquirrelMail code via custom preference handlers.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:34.569-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:48.876-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:53.562-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9587 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:37.565-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:27.805-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.3a-9.EL3" test_ref="oval:org.mitre.oval:tst:30441"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.3a-9.EL4" test_ref="oval:org.mitre.oval:tst:30956"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9584" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.3 and Mozilla Suite before 1.7.7, when blocking a popup, allows remote attackers to execute arbitrary code via a javascript: URL that is executed when the user selects the "Show javascript" option.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1153"/>
        <description>Firefox before 1.0.3 and Mozilla Suite before 1.7.7, when blocking a popup, allows remote attackers to execute arbitrary code via a javascript: URL that is executed when the user selects the "Show javascript" option.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:31.405-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:47.790-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:52.467-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9584 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:54.928-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:26.732-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31478"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31488"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31751"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31647"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30850"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31749"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31658"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31636"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31780"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30828"/>
            <criterion comment="firefox is earlier than 0:1.0.3-1.4.1" test_ref="oval:org.mitre.oval:tst:31646"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31716"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31758"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9583" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one buffer overflow in pnmtopng before 2.39, when using the -alpha command line option (Alphas_Of_Color), allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM file with exactly 256 colors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662"/>
        <description>Off-by-one buffer overflow in pnmtopng before 2.39, when using the -alpha command line option (Alphas_Of_Color), allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM file with exactly 256 colors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:20.145-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:47.584-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:52.240-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9583 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:38.160-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:26.391-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="netpbm is earlier than 0:9.24-11.30.4" test_ref="oval:org.mitre.oval:tst:32233"/>
          <criterion comment="netpbm-progs is earlier than 0:9.24-11.30.4" test_ref="oval:org.mitre.oval:tst:32304"/>
          <criterion comment="netpbm-devel is earlier than 0:9.24-11.30.4" test_ref="oval:org.mitre.oval:tst:32108"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9581" version="5" class="vulnerability">
      <metadata>
        <title>Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with an Identification payload with a length that becomes less than 8 during byte order conversion, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0184"/>
        <description>Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with an Identification payload with a length that becomes less than 8 during byte order conversion, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:30.749-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:46.713-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:51.203-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9581 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:53.427-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:26.117-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="libpcap is earlier than 14:0.7.2-7.E3.2" test_ref="oval:org.mitre.oval:tst:30722"/>
          <criterion comment="tcpdump is earlier than 14:3.7.2-7.E3.2" test_ref="oval:org.mitre.oval:tst:29722"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9580" version="5" class="vulnerability">
      <metadata>
        <title>The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0112"/>
        <description>The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:42.370-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:46.500-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:50.918-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9580 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:40.839-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:25.766-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.4" test_ref="oval:org.mitre.oval:tst:30638"/>
          <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.4" test_ref="oval:org.mitre.oval:tst:30381"/>
          <criterion comment="openssl is earlier than 0:0.9.7a-33.4" test_ref="oval:org.mitre.oval:tst:30673"/>
          <criterion comment="openssl096b is earlier than 0:0.9.6b-16" test_ref="oval:org.mitre.oval:tst:30479"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9579" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the sql_escape_func function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote attackers to cause a denial of service (crash).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1455"/>
        <description>Buffer overflow in the sql_escape_func function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote attackers to cause a denial of service (crash).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:40.137-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:46.138-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:50.652-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9579 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:47.620-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:25.380-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="freeradius is earlier than 0:1.0.1-1.1.RHEL3" test_ref="oval:org.mitre.oval:tst:31698"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freeradius-mysql is earlier than 0:1.0.1-3.RHEL4" test_ref="oval:org.mitre.oval:tst:32002"/>
            <criterion comment="freeradius-unixODBC is earlier than 0:1.0.1-3.RHEL4" test_ref="oval:org.mitre.oval:tst:31962"/>
            <criterion comment="freeradius is earlier than 0:1.0.1-3.RHEL4" test_ref="oval:org.mitre.oval:tst:31992"/>
            <criterion comment="freeradius-postgresql is earlier than 0:1.0.1-3.RHEL4" test_ref="oval:org.mitre.oval:tst:31999"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9578" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla allows remote attackers to cause a denial of service (application crash from null dereference or infinite loop) via a web page that contains a (1) TEXTAREA, (2) INPUT, (3) FRAMESET or (4) IMG tag followed by a null character and some trailing characters, as demonstrated by mangleme.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0147"/>
        <description>Firefox before 1.0 and Mozilla before 1.7.5, when configured to use a proxy, respond to 407 proxy auth requests from arbitrary servers, which allows remote attackers to steal NTLM or SPNEGO credentials.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:27.948-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:45.798-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:50.345-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9578 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:59.259-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:24.918-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:30819"/>
          <criterion comment="mozilla is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31515"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31278"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31465"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31606"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31480"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31417"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31313"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31469"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31598"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9577" version="5" class="vulnerability">
      <metadata>
        <title>The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364"/>
        <description>The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:05.981-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:45.435-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:49.913-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9577 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:58.410-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:24.353-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-71.ent" test_ref="oval:org.mitre.oval:tst:37941"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-71.ent" test_ref="oval:org.mitre.oval:tst:37561"/>
            <criterion comment="httpd is earlier than 0:2.0.46-71.ent" test_ref="oval:org.mitre.oval:tst:37595"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37897"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37670"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37862"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37679"/>
            <criterion comment="httpd is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37575"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-manual is earlier than 0:2.2.3-11.el5_2.4" test_ref="oval:org.mitre.oval:tst:37895"/>
            <criterion comment="httpd-devel is earlier than 0:2.2.3-11.el5_2.4" test_ref="oval:org.mitre.oval:tst:37730"/>
            <criterion comment="mod_ssl is earlier than 0:2.2.3-11.el5_2.4" test_ref="oval:org.mitre.oval:tst:36990"/>
            <criterion comment="httpd is earlier than 0:2.2.3-11.el5_2.4" test_ref="oval:org.mitre.oval:tst:37803"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9575" version="5" class="vulnerability">
      <metadata>
        <title>Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625"/>
        <description>Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:39.436-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:44.686-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:49.193-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9575 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:52.294-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:23.365-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32436"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32311"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32279"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.36" test_ref="oval:org.mitre.oval:tst:32437"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32507"/>
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.36" test_ref="oval:org.mitre.oval:tst:32206"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32377"/>
            <criterion comment="xpdf is earlier than 1:2.02-9.8" test_ref="oval:org.mitre.oval:tst:31474"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:31613"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.36" test_ref="oval:org.mitre.oval:tst:31553"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32260"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:32395"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32095"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:31805"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32489"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.10" test_ref="oval:org.mitre.oval:tst:32284"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32199"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.4" test_ref="oval:org.mitre.oval:tst:32545"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.10" test_ref="oval:org.mitre.oval:tst:32254"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32308"/>
            <criterion comment="xpdf is earlier than 1:3.00-11.10" test_ref="oval:org.mitre.oval:tst:32152"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32333"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32317"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.10" test_ref="oval:org.mitre.oval:tst:32499"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9573" version="5" class="vulnerability">
      <metadata>
        <title>Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0211"/>
        <description>Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:54.309-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:44.153-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:48.601-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9573 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:33.641-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:22.498-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.7" test_ref="oval:org.mitre.oval:tst:30954"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.3" test_ref="oval:org.mitre.oval:tst:31281"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9572" version="5" class="vulnerability">
      <metadata>
        <title>The TIFFToRGB function in libtiff before 3.8.1 allows remote attackers to cause a denial of service (crash) via a crafted TIFF image with Yr/Yg/Yb values that exceed the YCR/YCG/YCB values, which triggers an out-of-bounds read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2120"/>
        <description>The TIFFToRGB function in libtiff before 3.8.1 allows remote attackers to cause a denial of service (crash) via a crafted TIFF image with Yr/Yg/Yb values that exceed the YCR/YCG/YCB values, which triggers an out-of-bounds read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:30.281-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:43.884-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:48.350-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9572 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:43.980-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:22.110-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.5.7-25.el3.1" test_ref="oval:org.mitre.oval:tst:32689"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-25.el3.1" test_ref="oval:org.mitre.oval:tst:32435"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-10" test_ref="oval:org.mitre.oval:tst:32329"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-10" test_ref="oval:org.mitre.oval:tst:32637"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9571" version="5" class="vulnerability">
      <metadata>
        <title>VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1138"/>
        <description>VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:07.405-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:43.574-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:47.978-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9571 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:25.659-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:21.620-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.30E.1" test_ref="oval:org.mitre.oval:tst:30321"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.30E.1" test_ref="oval:org.mitre.oval:tst:31244"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.30E.1" test_ref="oval:org.mitre.oval:tst:30519"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.30E.1" test_ref="oval:org.mitre.oval:tst:30858"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.30E.1" test_ref="oval:org.mitre.oval:tst:31167"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31180"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31161"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31316"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31312"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31163"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9570" version="5" class="vulnerability">
      <metadata>
        <title>The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3443"/>
        <description>The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:01.689-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:43.069-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:47.463-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9570 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:04.805-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:20.886-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37606"/>
            <criterion comment="ruby-docs is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37736"/>
            <criterion comment="ruby-devel is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37427"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37760"/>
            <criterion comment="ruby is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37497"/>
            <criterion comment="irb is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37751"/>
            <criterion comment="ruby-libs is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:36770"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37462"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37630"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:36810"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:36902"/>
            <criterion comment="ruby is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37678"/>
            <criterion comment="irb is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37674"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37720"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-ri is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37735"/>
            <criterion comment="ruby-mode is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37344"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37697"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37273"/>
            <criterion comment="ruby is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37563"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37438"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37757"/>
            <criterion comment="ruby-irb is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37463"/>
            <criterion comment="ruby-rdoc is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37172"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9569" version="5" class="vulnerability">
      <metadata>
        <title>Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2498"/>
        <description>Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:49.732-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:42.575-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:46.934-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9569 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:29.809-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:20.282-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-25.ent" test_ref="oval:org.mitre.oval:tst:31517"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-25.ent" test_ref="oval:org.mitre.oval:tst:32191"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-25.ent" test_ref="oval:org.mitre.oval:tst:32009"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-25.ent" test_ref="oval:org.mitre.oval:tst:31823"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-25.ent" test_ref="oval:org.mitre.oval:tst:31971"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-25.ent" test_ref="oval:org.mitre.oval:tst:32008"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-25.ent" test_ref="oval:org.mitre.oval:tst:31197"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:32052"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:31200"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:31503"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:32192"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:31957"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:31771"/>
            <criterion comment="php is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:31974"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:31734"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:32178"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:31386"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:32029"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:31677"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:32000"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.8" test_ref="oval:org.mitre.oval:tst:32062"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9567" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1235"/>
        <description>Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:47.444-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:41.914-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:46.279-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9567 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:18.946-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:19.373-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31090"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31317"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31165"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31297"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31259"/>
            <criterion comment="kernel is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:30906"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31029"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31014"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:30920"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30633"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31009"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30369"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30421"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30594"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30616"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9564" version="5" class="vulnerability">
      <metadata>
        <title>The (1) SMB and (2) SMB2 dissectors in Wireshark 0.9.0 through 1.2.4 allow remote attackers to cause a denial of service (crash) via a crafted packet that triggers a NULL pointer dereference, as demonstrated by fuzz-2009-12-07-11141.pcap.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-4377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377"/>
        <description>The (1) SMB and (2) SMB2 dissectors in Wireshark 0.9.0 through 1.2.4 allow remote attackers to cause a denial of service (crash) via a crafted packet that triggers a NULL pointer dereference, as demonstrated by fuzz-2009-12-07-11141.pcap.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:24:01.901-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:40.893-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:45.228-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9564 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:54.068-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:18.464-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:39600"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:40430"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:40437"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:39877"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40351"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40208"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9562" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0384"/>
        <description>Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:47.619-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:39.963-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:44.268-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9562 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:44.513-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:17.100-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31148"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31473"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31178"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31282"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31565"/>
            <criterion comment="kernel is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31562"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31582"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:30730"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31534"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31545"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31539"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31661"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31482"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31112"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31605"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31330"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9561" version="5" class="vulnerability">
      <metadata>
        <title>Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044"/>
        <description>Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:59.818-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:39.578-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:43.834-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9561 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:27.712-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:16.521-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32525"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32366"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32381"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32215"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32464"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32288"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:31978"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32438"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32070"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32415"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32137"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32528"/>
            <criterion comment="kernel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:31866"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32446"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32450"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9558" version="5" class="vulnerability">
      <metadata>
        <title>The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029"/>
        <description>The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:30.060-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:38.331-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:42.544-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9558 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:13.538-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:14.631-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39591"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39396"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39586"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39171"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39299"/>
            <criterion comment="kernel is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39151"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39468"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39460"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:38810"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:37830"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:37968"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:37984"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:37633"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:37352"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:38043"/>
            <criterion comment="kernel is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:37989"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:37908"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:37748"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:37825"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-78.0.13.EL" test_ref="oval:org.mitre.oval:tst:38002"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:38161"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:37996"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:38259"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:37366"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:37939"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:38003"/>
            <criterion comment="kernel is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:38294"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:38054"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:37318"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:38086"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:38226"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-128.el5" test_ref="oval:org.mitre.oval:tst:38094"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9557" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411"/>
        <description>Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:43.242-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:37.939-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:42.206-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9557 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:24.577-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:14.110-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="hpijs is earlier than 0:1.3-32.1.13" test_ref="oval:org.mitre.oval:tst:36464"/>
            <criterion comment="ghostscript-devel is earlier than 0:7.05-32.1.13" test_ref="oval:org.mitre.oval:tst:36326"/>
            <criterion comment="ghostscript is earlier than 0:7.05-32.1.13" test_ref="oval:org.mitre.oval:tst:36149"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ghostscript-devel is earlier than 0:7.07-33.2.el4_6.1" test_ref="oval:org.mitre.oval:tst:36082"/>
            <criterion comment="ghostscript is earlier than 0:7.07-33.2.el4_6.1" test_ref="oval:org.mitre.oval:tst:35551"/>
            <criterion comment="ghostscript-gtk is earlier than 0:7.07-33.2.el4_6.1" test_ref="oval:org.mitre.oval:tst:36061"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ghostscript-devel is earlier than 0:8.15.2-9.1.el5_1.1" test_ref="oval:org.mitre.oval:tst:36325"/>
            <criterion comment="ghostscript is earlier than 0:8.15.2-9.1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35805"/>
            <criterion comment="ghostscript-gtk is earlier than 0:8.15.2-9.1.el5_1.1" test_ref="oval:org.mitre.oval:tst:36363"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9553" version="5" class="vulnerability">
      <metadata>
        <title>Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2549"/>
        <description>Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:47.863-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:36.838-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:40.846-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9553 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:03.212-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:12.531-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution is earlier than 0:1.4.5-16" test_ref="oval:org.mitre.oval:tst:31035"/>
            <criterion comment="evolution-devel is earlier than 0:1.4.5-16" test_ref="oval:org.mitre.oval:tst:31372"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution is earlier than 0:2.0.2-16.3" test_ref="oval:org.mitre.oval:tst:31247"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-16.3" test_ref="oval:org.mitre.oval:tst:31492"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9552" version="5" class="vulnerability">
      <metadata>
        <title>The rose_rt_ioctl function in rose_route.c for Radionet Open Source Environment (ROSE) in Linux 2.6 kernels before 2.6.12, and 2.4 before 2.4.29, does not properly verify the ndigis argument for a new route, which allows attackers to trigger array out-of-bounds errors with a large number of digipeats.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273"/>
        <description>The rose_rt_ioctl function in rose_route.c for Radionet Open Source Environment (ROSE) in Linux 2.6 kernels before 2.6.12, and 2.4 before 2.4.29, does not properly verify the ndigis argument for a new route, which allows attackers to trigger array out-of-bounds errors with a large number of digipeats.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:07.150-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:36.562-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:40.554-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9552 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:09:03.505-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:12.163-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
          <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9551" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234"/>
        <description>Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:45.945-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:35.820-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:39.654-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9551 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:17.482-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:11.414-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36547"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36570"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36574"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35661"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36605"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35672"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35874"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36533"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36355"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36379"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36587"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:35752"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-10.el4" test_ref="oval:org.mitre.oval:tst:36259"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36586"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36333"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36500"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.14.el4" test_ref="oval:org.mitre.oval:tst:35884"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36540"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36602"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36557"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36221"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36566"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36305"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-11.el5_1" test_ref="oval:org.mitre.oval:tst:36619"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9548" version="5" class="vulnerability">
      <metadata>
        <title>Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0195"/>
        <description>Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:36.246-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:35.106-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:38.852-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9548 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:18.503-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:10.315-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.6-5.el3" test_ref="oval:org.mitre.oval:tst:32265"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.6-5.el4" test_ref="oval:org.mitre.oval:tst:32721"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9547" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to bypass the same-origin policy and conduct cross-site scripting (XSS) and other attacks by using the addEventListener method to add an event listener for a site, which is executed in the context of that site.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2870"/>
        <description>Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to bypass the same-origin policy and conduct cross-site scripting (XSS) and other attacks by using the addEventListener method to add an event listener for a site, which is executed in the context of that site.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:43.525-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:34.479-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:38.279-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9547 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:37.382-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:09.540-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34409"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34257"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34432"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33988"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33721"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33693"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34313"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34281"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33894"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34228"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:33625"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33931"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33844"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34334"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34021"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34249"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:34293"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.1.el4" test_ref="oval:org.mitre.oval:tst:34371"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34446"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34262"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34366"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33994"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34322"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:34445"/>
            <criterion comment="yelp is earlier than 0:2.16.0-15.el5" test_ref="oval:org.mitre.oval:tst:33445"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-11.el5" test_ref="oval:org.mitre.oval:tst:34323"/>
            <criterion comment="devhelp is earlier than 0:0.12-11.el5" test_ref="oval:org.mitre.oval:tst:34204"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:34162"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9545" version="5" class="vulnerability">
      <metadata>
        <title>lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1269"/>
        <description>lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:18.233-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:33.926-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:37.699-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9545 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:25.465-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:09.137-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.22" test_ref="oval:org.mitre.oval:tst:30882"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.22" test_ref="oval:org.mitre.oval:tst:31108"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.22" test_ref="oval:org.mitre.oval:tst:31170"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:30919"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:31056"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:31093"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9544" version="5" class="vulnerability">
      <metadata>
        <title>Gaim before 1.3.1 allows remote attackers to cause a denial of service (application crash) via a Yahoo! message with non-ASCII characters in a file name.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1269"/>
        <description>Gaim before 1.3.1 allows remote attackers to cause a denial of service (application crash) via a Yahoo! message with non-ASCII characters in a file name.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:35.089-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:33.706-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:37.471-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9544 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:53.391-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:08.736-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.3.1-0.el3" test_ref="oval:org.mitre.oval:tst:31762"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.3.1-0.el4" test_ref="oval:org.mitre.oval:tst:31939"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9543" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0142"/>
        <description>Firefox 0.9, Thunderbird 0.6 and other versions before 0.9, and Mozilla 1.7 before 1.7.5 save temporary files with world-readable permissions, which allows local users to read certain web content or attachments that belong to other users, e.g. content that is managed by helper applications such as PDF.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:26.755-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:33.212-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:36.927-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9543 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:56.986-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:08.116-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30665"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31499"/>
            <criterion comment="mozilla is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31604"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31381"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31622"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30651"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31560"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31110"/>
            <criterion comment="evolution is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31003"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31404"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31375"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31106"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31418"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31558"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:954" version="2" class="vulnerability">
      <metadata>
        <title>Konqueror URI Handler "-" Filter Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0411"/>
        <description>The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter "-" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-19T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-16T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-30T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:54.899-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:10.684-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="kdelibs version is less than 3.1.3-6.4" negate="false" test_ref="oval:org.mitre.oval:tst:1426"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="telnet, rlogin, ssh or kmail is executable">
            <criteria operator="OR" comment="/usr/bin/telnet is executable">
              <criterion comment="/usr/bin/telnet is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1425"/>
              <criterion comment="/usr/bin/telnet is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1424"/>
              <criterion comment="/usr/bin/telnet is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1423"/>
            </criteria>
            <criteria operator="OR" comment="/usr/kerberos/bin/telnet is executable">
              <criterion comment="/usr/kerberos/bin/telnet is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1422"/>
              <criterion comment="/usr/kerberos/bin/telnet is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1421"/>
              <criterion comment="/usr/kerberos/bin/telnet is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1420"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/rlogin is executable">
              <criterion comment="/usr/bin/rlogin is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1419"/>
              <criterion comment="/usr/bin/rlogin is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1418"/>
              <criterion comment="/usr/bin/rlogin is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1417"/>
            </criteria>
            <criteria operator="OR" comment="/usr/kerberos/bin/rlogin is executable">
              <criterion comment="/usr/kerberos/bin/rlogin is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1416"/>
              <criterion comment="/usr/kerberos/bin/rlogin is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1415"/>
              <criterion comment="/usr/kerberos/bin/rlogin is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1414"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ssh is executable">
              <criterion comment="/usr/bin/ssh is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1413"/>
              <criterion comment="/usr/bin/ssh is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1412"/>
              <criterion comment="/usr/bin/ssh is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1411"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/kmail is executable">
              <criterion comment="/usr/bin/kmail is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1410"/>
              <criterion comment="/usr/bin/kmail is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1409"/>
              <criterion comment="/usr/bin/kmail is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1408"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9539" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000"/>
        <description>Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:15.632-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:31.458-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:35.154-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9539 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:50.570-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:06.763-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-70.ent" test_ref="oval:org.mitre.oval:tst:35773"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-70.ent" test_ref="oval:org.mitre.oval:tst:36016"/>
            <criterion comment="httpd is earlier than 0:2.0.46-70.ent" test_ref="oval:org.mitre.oval:tst:35281"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35606"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35973"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35916"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35852"/>
            <criterion comment="httpd is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35768"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-manual is earlier than 0:2.2.3-11.el5_1.3" test_ref="oval:org.mitre.oval:tst:35953"/>
            <criterion comment="httpd-devel is earlier than 0:2.2.3-11.el5_1.3" test_ref="oval:org.mitre.oval:tst:35668"/>
            <criterion comment="mod_ssl is earlier than 0:2.2.3-11.el5_1.3" test_ref="oval:org.mitre.oval:tst:35991"/>
            <criterion comment="httpd is earlier than 0:2.2.3-11.el5_1.3" test_ref="oval:org.mitre.oval:tst:35696"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9538" version="5" class="vulnerability">
      <metadata>
        <title>slocate before 2.7 does not properly process very long paths, which allows local users to cause a denial of service (updatedb exit and incomplete slocate database) via a certain crafted directory structure.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2499"/>
        <description>slocate before 2.7 does not properly process very long paths, which allows local users to cause a denial of service (updatedb exit and incomplete slocate database) via a certain crafted directory structure.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:06.098-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:31.237-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:34.882-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9538 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:14:00.149-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:06.406-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="slocate is earlier than 0:2.7-3.RHEL3.6" test_ref="oval:org.mitre.oval:tst:31533"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="slocate is earlier than 0:2.7-13.el4.6" test_ref="oval:org.mitre.oval:tst:31470"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9537" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the WBXML dissector in Wireshark (formerly Ethereal) 0.10.11 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger a null dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5469"/>
        <description>Unspecified vulnerability in the WBXML dissector in Wireshark (formerly Ethereal) 0.10.11 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger a null dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:11.323-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:30.958-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:34.630-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9537 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:12:58.000-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:05.809-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.4-EL3.1" test_ref="oval:org.mitre.oval:tst:33205"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.4-EL3.1" test_ref="oval:org.mitre.oval:tst:33170"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.4-EL4.1" test_ref="oval:org.mitre.oval:tst:32550"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.4-EL4.1" test_ref="oval:org.mitre.oval:tst:33152"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9534" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unknown vulnerabilities in the (1) KINK, (2) L2TP, (3) MGCP, (4) EIGRP, (5) DLSw, (6) MEGACO, (7) LMP, and (8) RSVP dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (infinite loop).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1464"/>
        <description>Multiple unknown vulnerabilities in the (1) KINK, (2) L2TP, (3) MGCP, (4) EIGRP, (5) DLSw, (6) MEGACO, (7) LMP, and (8) RSVP dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (infinite loop).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:29.313-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:29.978-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:33.609-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9534 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:12:55.829-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:04.330-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9533" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0593"/>
        <description>Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:32.456-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:29.655-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:33.267-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9533 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:38.233-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:03.820-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="firefox is earlier than 0:1.0.1-1.4.3" test_ref="oval:org.mitre.oval:tst:31118"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9529" version="5" class="vulnerability">
      <metadata>
        <title>The XPConnect component in Mozilla Firefox before 2.0.0.17 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to a SCRIPT element.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4059"/>
        <description>The XPConnect component in Mozilla Firefox before 2.0.0.17 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to a SCRIPT element.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:59.233-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:28.415-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:31.967-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9529 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:51.964-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:02.102-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-16.el4" test_ref="oval:org.mitre.oval:tst:37634"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="thunderbird is earlier than 0:2.0.0.17-1.el5" test_ref="oval:org.mitre.oval:tst:37230"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9528" version="5" class="vulnerability">
      <metadata>
        <title>Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3.  NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie.  Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability.  NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4253" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253"/>
        <description>Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3.  NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie.  Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability.  NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:19.553-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:27.878-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:31.461-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9528 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:01.521-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:01.438-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32759"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32989"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32809"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32779"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32954"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32668"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33010"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32811"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32981"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33061"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:32072"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33120"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32910"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32677"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32933"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32243"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:33062"/>
            <criterion comment="firefox is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32951"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32978"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33072"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33079"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32121"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33077"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9526" version="5" class="vulnerability">
      <metadata>
        <title>Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210"/>
        <description>Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:36.890-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:27.268-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:30.654-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9526 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:12:58.883-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:20:00.447-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.8-EL3.1" test_ref="oval:org.mitre.oval:tst:38258"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.8-EL3.1" test_ref="oval:org.mitre.oval:tst:38534"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.8-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:38635"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.8-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:38709"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.8-1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38670"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.8-1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38619"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9523" version="5" class="vulnerability">
      <metadata>
        <title>The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a symlink attack on temporary files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0968"/>
        <description>The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a symlink attack on temporary files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:43.499-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:26.269-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:29.651-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9523 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:14:15.719-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:59.134-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="glibc is earlier than 0:2.3.2-95.30" test_ref="oval:org.mitre.oval:tst:30926"/>
          <criterion comment="glibc-utils is earlier than 0:2.3.2-95.30" test_ref="oval:org.mitre.oval:tst:30313"/>
          <criterion comment="glibc-devel is earlier than 0:2.3.2-95.30" test_ref="oval:org.mitre.oval:tst:31018"/>
          <criterion comment="nptl-devel is earlier than 0:2.3.2-95.30" test_ref="oval:org.mitre.oval:tst:31055"/>
          <criterion comment="nscd is earlier than 0:2.3.2-95.30" test_ref="oval:org.mitre.oval:tst:30469"/>
          <criterion comment="glibc-profile is earlier than 0:2.3.2-95.30" test_ref="oval:org.mitre.oval:tst:31102"/>
          <criterion comment="glibc-common is earlier than 0:2.3.2-95.30" test_ref="oval:org.mitre.oval:tst:30967"/>
          <criterion comment="glibc-headers is earlier than 0:2.3.2-95.30" test_ref="oval:org.mitre.oval:tst:31074"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9522" version="5" class="vulnerability">
      <metadata>
        <title>sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1760"/>
        <description>sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:19.772-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:26.010-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:29.425-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9522 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:12:56.532-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:58.756-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="sysreport is earlier than 0:1.3.7.2-6" test_ref="oval:org.mitre.oval:tst:31795"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="sysreport is earlier than 0:1.3.15-2" test_ref="oval:org.mitre.oval:tst:31426"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9521" version="5" class="vulnerability">
      <metadata>
        <title>Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0010"/>
        <description>Unknown vulnerability in the MMSE dissector in Ethereal 0.10.4 through 0.10.8 allows remote attackers to cause a denial of service by triggering a free of statically allocated memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:25.192-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:25.685-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:29.169-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9521 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:32.845-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:57.870-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31265"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31218"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31097"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31103"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9514" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in PHP before 5.2.1 allows attackers to "clobber" certain super-global variables via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910"/>
        <description>Unspecified vulnerability in PHP before 5.2.1 allows attackers to "clobber" certain super-global variables via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:55.962-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:23.592-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:27.345-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9514 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:50.992-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:55.296-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33459"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33371"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33748"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33090"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33419"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33665"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33475"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33282"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33636"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33548"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33156"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33407"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33562"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33500"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33725"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33105"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33501"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33691"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33662"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33087"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33640"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:32784"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33240"/>
            <criterion comment="php-common is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33527"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33617"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33561"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33385"/>
            <criterion comment="php is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33615"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33526"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33747"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33735"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33403"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33686"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33502"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33666"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33508"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33652"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33676"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33784"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33706"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9512" version="5" class="vulnerability">
      <metadata>
        <title>The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0003"/>
        <description>The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:50.777-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:22.959-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:26.660-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9512 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:05.481-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:54.460-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31090"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31317"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31165"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31297"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31259"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:30906"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31029"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31014"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:30920"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9511" version="5" class="vulnerability">
      <metadata>
        <title>fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210"/>
        <description>fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:28.578-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:22.355-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:25.996-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9511 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:05.196-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:53.631-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37931"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37846"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37817"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37663"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37799"/>
            <criterion comment="kernel is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37028"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37885"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37981"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37117"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37470"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37734"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37826"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37656"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37782"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37432"/>
            <criterion comment="kernel is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37747"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37811"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37951"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37485"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-78.0.8.EL" test_ref="oval:org.mitre.oval:tst:37662"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37778"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37855"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37870"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37881"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37504"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37738"/>
            <criterion comment="kernel is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37774"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37247"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37715"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37954"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37668"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-92.1.18.el5" test_ref="oval:org.mitre.oval:tst:37947"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9508" version="5" class="vulnerability">
      <metadata>
        <title>Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747"/>
        <description>Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:34.261-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:21.548-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:25.124-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9508 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:13.977-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:52.527-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.4-4.0.rhel3.2" test_ref="oval:org.mitre.oval:tst:32599"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.4-4.0.rhel3.2" test_ref="oval:org.mitre.oval:tst:32616"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.9-1.rhel4.4" test_ref="oval:org.mitre.oval:tst:32106"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.9-1.rhel4.4" test_ref="oval:org.mitre.oval:tst:32605"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.9-1.rhel4.4" test_ref="oval:org.mitre.oval:tst:32417"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.9-1.rhel4.4" test_ref="oval:org.mitre.oval:tst:32653"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9507" version="5" class="vulnerability">
      <metadata>
        <title>The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725"/>
        <description>The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:32.649-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:21.152-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:24.739-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9507 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:15.502-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:51.983-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="hpijs is earlier than 0:7.05-32.1.20" test_ref="oval:org.mitre.oval:tst:38025"/>
            <criterion comment="ghostscript-devel is earlier than 0:7.05-32.1.20" test_ref="oval:org.mitre.oval:tst:38598"/>
            <criterion comment="ghostscript is earlier than 0:7.05-32.1.20" test_ref="oval:org.mitre.oval:tst:38506"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ghostscript-devel is earlier than 0:7.07-33.2.el4_7.8" test_ref="oval:org.mitre.oval:tst:38482"/>
            <criterion comment="ghostscript is earlier than 0:7.07-33.2.el4_7.8" test_ref="oval:org.mitre.oval:tst:38656"/>
            <criterion comment="ghostscript-gtk is earlier than 0:7.07-33.2.el4_7.8" test_ref="oval:org.mitre.oval:tst:38408"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ghostscript-devel is earlier than 0:8.15.2-9.4.el5_3.7" test_ref="oval:org.mitre.oval:tst:38588"/>
            <criterion comment="ghostscript is earlier than 0:8.15.2-9.4.el5_3.7" test_ref="oval:org.mitre.oval:tst:38629"/>
            <criterion comment="ghostscript-gtk is earlier than 0:8.15.2-9.4.el5_3.7" test_ref="oval:org.mitre.oval:tst:38457"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9506" version="5" class="vulnerability">
      <metadata>
        <title>libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663"/>
        <description>libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:24.099-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:20.810-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:24.423-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9506 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:06.388-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:51.508-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.0-11.el3" test_ref="oval:org.mitre.oval:tst:39170"/>
            <criterion comment="libvorbis is earlier than 1:1.0-11.el3" test_ref="oval:org.mitre.oval:tst:38631"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.0-3.el4_8.2" test_ref="oval:org.mitre.oval:tst:38645"/>
            <criterion comment="libvorbis is earlier than 1:1.1.0-3.el4_8.2" test_ref="oval:org.mitre.oval:tst:38909"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.2-3.el5_3.3" test_ref="oval:org.mitre.oval:tst:39192"/>
            <criterion comment="libvorbis is earlier than 1:1.1.2-3.el5_3.3" test_ref="oval:org.mitre.oval:tst:39166"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9503" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186"/>
        <description>Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:47.594-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:20.287-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:23.834-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9503 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:54.942-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:50.690-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-13.el3.3" test_ref="oval:org.mitre.oval:tst:32203"/>
            <criterion comment="gtk2 is earlier than 0:2.2.4-19" test_ref="oval:org.mitre.oval:tst:32214"/>
            <criterion comment="gdk-pixbuf-gnome is earlier than 1:0.22.0-13.el3.3" test_ref="oval:org.mitre.oval:tst:32393"/>
            <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-13.el3.3" test_ref="oval:org.mitre.oval:tst:32388"/>
            <criterion comment="gtk2-devel is earlier than 0:2.2.4-19" test_ref="oval:org.mitre.oval:tst:32156"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-17.el4.3" test_ref="oval:org.mitre.oval:tst:32239"/>
            <criterion comment="gtk2 is earlier than 0:2.4.13-18" test_ref="oval:org.mitre.oval:tst:32313"/>
            <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-17.el4.3" test_ref="oval:org.mitre.oval:tst:32331"/>
            <criterion comment="gtk2-devel is earlier than 0:2.4.13-18" test_ref="oval:org.mitre.oval:tst:32250"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9502" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-0174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174"/>
        <description>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:10.285-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:19.747-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:22.915-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9502 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:17.964-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:49.996-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40246"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39934"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40184"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40133"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39775"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40360"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40059"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39946"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40114"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39403"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.19-1.el4" test_ref="oval:org.mitre.oval:tst:40284"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40081"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40250"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40304"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40345"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40183"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:39945"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:40265"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:39621"/>
            <criterion comment="firefox is earlier than 0:3.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:40064"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:40164"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9501" version="5" class="vulnerability">
      <metadata>
        <title>The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr; (2) UnhookTextRunFromFrames and ClearAllTextRunReferences; (3) nsTextFrame::ClearTextRun; (4) IsPercentageAware; (5) PL_DHashTableFinish; (6) nsListBoxBodyFrame::GetNextItemBox; (7) AtomTableClearEntry, related to the atom table, DOM mutation events, and Unicode surrogates; (8) nsHTMLEditor::HideResizers; and (9) nsWindow::SetCursor, related to changing the cursor; and other vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392"/>
        <description>The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr; (2) UnhookTextRunFromFrames and ClearAllTextRunReferences; (3) nsTextFrame::ClearTextRun; (4) IsPercentageAware; (5) PL_DHashTableFinish; (6) nsListBoxBodyFrame::GetNextItemBox; (7) AtomTableClearEntry, related to the atom table, DOM mutation events, and Unicode surrogates; (8) nsHTMLEditor::HideResizers; and (9) nsWindow::SetCursor, related to changing the cursor; and other vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:04.877-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:19.237-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:22.404-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9501 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:49.536-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:49.305-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38336"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38452"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38736"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38742"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38069"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38264"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38724"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38791"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38432"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:37902"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38793"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-23.el4" test_ref="oval:org.mitre.oval:tst:38562"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38213"/>
            <criterion comment="firefox is earlier than 0:3.0.11-4.el4" test_ref="oval:org.mitre.oval:tst:38689"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38280"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38531"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38828"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38655"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38771"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38371"/>
            <criterion comment="firefox is earlier than 0:3.0.11-2.el5_3" test_ref="oval:org.mitre.oval:tst:38682"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.22-2.el5_3" test_ref="oval:org.mitre.oval:tst:38801"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38718"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9500" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420"/>
        <description>Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:24.692-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:18.881-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:22.091-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9500 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:20.632-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:48.775-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.0-10.el3" test_ref="oval:org.mitre.oval:tst:36659"/>
            <criterion comment="libvorbis is earlier than 1:1.0-10.el3" test_ref="oval:org.mitre.oval:tst:36699"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 0:1.1.0-3.el4_6.1" test_ref="oval:org.mitre.oval:tst:36519"/>
            <criterion comment="libvorbis is earlier than 0:1.1.0-3.el4_6.1" test_ref="oval:org.mitre.oval:tst:36387"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 0:1.1.2-3.el5_1.2" test_ref="oval:org.mitre.oval:tst:36439"/>
            <criterion comment="libvorbis is earlier than 0:1.1.2-3.el5_1.2" test_ref="oval:org.mitre.oval:tst:36710"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9496" version="5" class="vulnerability">
      <metadata>
        <title>KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062"/>
        <description>KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:21.128-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:17.980-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:21.180-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9496 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:20.416-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:47.436-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36272"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36493"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36531"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36304"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36522"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36541"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36418"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36371"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36482"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36318"/>
            <criterion comment="krb5 is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36285"/>
            <criterion comment="krb5-libs is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36069"/>
            <criterion comment="krb5-server is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36233"/>
            <criterion comment="krb5-devel is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36199"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9495" version="5" class="vulnerability">
      <metadata>
        <title>rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0426"/>
        <description>rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:01.941-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:17.798-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:20.959-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9495 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:30.307-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:47.173-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="rsync is earlier than 0:2.5.7-4.3E" test_ref="oval:org.mitre.oval:tst:30539"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9494" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey do not properly implement the Same Origin Policy for (1) XMLHttpRequest, involving a mismatch for a document's principal, and (2) XPCNativeWrapper.toString, involving an incorrect __proto__ scope, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via a crafted document.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309"/>
        <description>Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey do not properly implement the Same Origin Policy for (1) XMLHttpRequest, involving a mismatch for a document's principal, and (2) XPCNativeWrapper.toString, involving an incorrect __proto__ scope, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via a crafted document.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:18.740-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:17.298-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:20.316-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9494 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:22.323-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:46.453-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38597"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38375"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38403"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38521"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38542"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:37726"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38677"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38096"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38577"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38540"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38634"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-23.el4" test_ref="oval:org.mitre.oval:tst:38562"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38697"/>
            <criterion comment="firefox is earlier than 0:3.0.9-1.el4" test_ref="oval:org.mitre.oval:tst:38379"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38716"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38190"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38685"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38596"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38308"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38633"/>
            <criterion comment="firefox is earlier than 0:3.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38370"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.22-2.el5_3" test_ref="oval:org.mitre.oval:tst:38801"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38462"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9493" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844"/>
        <description>Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:31.463-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:16.726-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:19.710-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9493 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:38.382-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:45.581-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35512"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35540"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35394"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35541"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35553"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35552"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:34924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35155"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35441"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35489"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35324"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.5.el4" test_ref="oval:org.mitre.oval:tst:35240"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35182"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35311"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35454"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.7.el4" test_ref="oval:org.mitre.oval:tst:35398"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35351"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35482"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34790"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35291"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34577"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35262"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35202"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-5.el5" test_ref="oval:org.mitre.oval:tst:35177"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9492" version="5" class="vulnerability">
      <metadata>
        <title>Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (crash) via crafted IPP packets.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0597"/>
        <description>Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (crash) via crafted IPP packets.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:18.085-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:16.459-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:19.429-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9492 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:41.664-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:45.174-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 0:1.1.17-13.3.51" test_ref="oval:org.mitre.oval:tst:36392"/>
            <criterion comment="cups is earlier than 0:1.1.17-13.3.51" test_ref="oval:org.mitre.oval:tst:36393"/>
            <criterion comment="cups-libs is earlier than 0:1.1.17-13.3.51" test_ref="oval:org.mitre.oval:tst:36450"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.20.2.el4_6.5" test_ref="oval:org.mitre.oval:tst:35932"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.20.2.el4_6.5" test_ref="oval:org.mitre.oval:tst:36243"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.20.2.el4_6.5" test_ref="oval:org.mitre.oval:tst:36438"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9491" version="5" class="vulnerability">
      <metadata>
        <title>EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787"/>
        <description>EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:21.461-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:15.930-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:18.885-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9491 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:35.760-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:44.515-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32575"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32674"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32919"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32864"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32659"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32859"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32902"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32837"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9488" version="5" class="vulnerability">
      <metadata>
        <title>The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120"/>
        <description>The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:36.652-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:14.892-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:17.959-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9488 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:17.716-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:43.279-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:36051"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:35980"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35669"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:35709"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:36120"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35712"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35801"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9485" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the BMP image format parser for the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0691"/>
        <description>Heap-based buffer overflow in the BMP image format parser for the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:08.746-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:13.732-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:16.768-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9485 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:37.994-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:42.398-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="qt-config is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30825"/>
          <criterion comment="qt is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30487"/>
          <criterion comment="qt-devel is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30732"/>
          <criterion comment="qt-MySQL is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30758"/>
          <criterion comment="qt-designer is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30345"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9484" version="5" class="vulnerability">
      <metadata>
        <title>WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1698"/>
        <description>WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:24.152-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:13.426-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:16.458-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9484 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:30.909-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:41.867-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdelibs is earlier than 6:3.1.3-6.13" test_ref="oval:org.mitre.oval:tst:38767"/>
            <criterion comment="kdelibs-devel is earlier than 6:3.1.3-6.13" test_ref="oval:org.mitre.oval:tst:38487"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdelibs is earlier than 6:3.3.1-14.el4" test_ref="oval:org.mitre.oval:tst:37977"/>
            <criterion comment="kdelibs-devel is earlier than 6:3.3.1-14.el4" test_ref="oval:org.mitre.oval:tst:38299"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdelibs-apidocs is earlier than 6:3.5.4-22.el5_3" test_ref="oval:org.mitre.oval:tst:38102"/>
            <criterion comment="kdelibs is earlier than 6:3.5.4-22.el5_3" test_ref="oval:org.mitre.oval:tst:38389"/>
            <criterion comment="kdelibs-devel is earlier than 6:3.5.4-22.el5_3" test_ref="oval:org.mitre.oval:tst:38720"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9482" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5740"/>
        <description>Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:09.293-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:12.944-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:15.922-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9482 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:57.587-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:41.187-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.4-EL3.1" test_ref="oval:org.mitre.oval:tst:33205"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.4-EL3.1" test_ref="oval:org.mitre.oval:tst:33170"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.4-EL4.1" test_ref="oval:org.mitre.oval:tst:32550"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.4-EL4.1" test_ref="oval:org.mitre.oval:tst:33152"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9481" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the libMagick componet of ImageMagick 6.0.6.2 might allow attackers to execute arbitrary code via an image index array that triggers the overflow during filename glob expansion by the ExpandFilenames function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2440"/>
        <description>Heap-based buffer overflow in the libMagick componet of ImageMagick 6.0.6.2 might allow attackers to execute arbitrary code via an image index array that triggers the overflow during filename glob expansion by the ExpandFilenames function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:19.462-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:12.626-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:15.598-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9481 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:22.562-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:40.696-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33189"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33318"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33102"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33080"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-24" test_ref="oval:org.mitre.oval:tst:33315"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:33269"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:33326"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:32926"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:32622"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-16.0.3" test_ref="oval:org.mitre.oval:tst:33361"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9480" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the FileReadGIF function in tkImgGIF.c for Tk Toolkit 8.4.12 and earlier, and 8.3.5 and earlier, allows user-assisted attackers to cause a denial of service (segmentation fault) via an animated GIF in which the first subimage is smaller than a subsequent subimage, which triggers the overflow in the ReadImage function, a different vulnerability than CVE-2007-5137.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5378"/>
        <description>Buffer overflow in the FileReadGIF function in tkImgGIF.c for Tk Toolkit 8.4.12 and earlier, and 8.3.5 and earlier, allows user-assisted attackers to cause a denial of service (segmentation fault) via an animated GIF in which the first subimage is smaller than a subsequent subimage, which triggers the overflow in the ReadImage function, a different vulnerability than CVE-2007-5137.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:23.200-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:12.285-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:15.244-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9480 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:15.516-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:40.221-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tix is earlier than 0:8.1.4-92.8" test_ref="oval:org.mitre.oval:tst:36200"/>
            <criterion comment="tclx is earlier than 0:8.3-92.8" test_ref="oval:org.mitre.oval:tst:35800"/>
            <criterion comment="tcl-devel is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:35961"/>
            <criterion comment="expect-devel is earlier than 0:5.38.0-92.8" test_ref="oval:org.mitre.oval:tst:36175"/>
            <criterion comment="tcltk is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:36169"/>
            <criterion comment="itcl is earlier than 0:3.2-92.8" test_ref="oval:org.mitre.oval:tst:35879"/>
            <criterion comment="tcl is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:36313"/>
            <criterion comment="expect is earlier than 0:5.38.0-92.8" test_ref="oval:org.mitre.oval:tst:35369"/>
            <criterion comment="tk-devel is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:36316"/>
            <criterion comment="tk is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:36018"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tk-devel is earlier than 0:8.4.7-3.el4_6.1" test_ref="oval:org.mitre.oval:tst:36356"/>
            <criterion comment="tk is earlier than 0:8.4.7-3.el4_6.1" test_ref="oval:org.mitre.oval:tst:36225"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9475" version="5" class="vulnerability">
      <metadata>
        <title>The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0052"/>
        <description>The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:02.110-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:12.068-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:14.943-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9475 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:12.831-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:39.835-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="mailman is earlier than 3:2.1.5.1-25.rhel3.5" test_ref="oval:org.mitre.oval:tst:32725"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="mailman is earlier than 3:2.1.5.1-34.rhel4.3" test_ref="oval:org.mitre.oval:tst:32480"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9473" version="5" class="vulnerability">
      <metadata>
        <title>The HTTP dissector in Ethereal 0.10.1 through 0.10.7 allows remote attackers to cause a denial of service (application crash) via a certain packet that causes the dissector to access previously-freed memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1141"/>
        <description>The HTTP dissector in Ethereal 0.10.1 through 0.10.7 allows remote attackers to cause a denial of service (application crash) via a certain packet that causes the dissector to access previously-freed memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:12.964-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:11.563-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:14.451-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9473 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:38.712-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:39.132-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31265"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31218"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31097"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31103"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9472" version="5" class="vulnerability">
      <metadata>
        <title>Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055"/>
        <description>Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:14.540-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:11.156-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:13.978-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9472 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:54.579-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:38.551-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32158"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32589"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32704"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32562"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32078"/>
            <criterion comment="kernel is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32513"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32231"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32097"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32708"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32335"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32833"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32825"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32836"/>
            <criterion comment="kernel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32736"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:31931"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32361"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32793"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-42.EL" test_ref="oval:org.mitre.oval:tst:32795"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:947" version="4" class="vulnerability">
      <metadata>
        <title>KAME IKE Daemon Improper Hash Value Handling</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0164"/>
        <description>KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-12T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-16T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-30T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:42:05.590-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:10.481-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.756-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T20:54:36.771-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:47.070-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="ipsec-tools version is less than 0.2.5-0.4" negate="false" test_ref="oval:org.mitre.oval:tst:1430"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="racoon is listening on the network" negate="false" test_ref="oval:org.mitre.oval:tst:1429"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9469" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0008"/>
        <description>Integer overflow in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:32.733-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:10.246-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:13.103-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9469 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:33.435-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:37.316-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="gaim is earlier than 1:0.75-3.2.0" test_ref="oval:org.mitre.oval:tst:30440"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9468" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632"/>
        <description>Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:23:10.759-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:09.965-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:12.799-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9468 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:10.632-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:36.893-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32882"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32738"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32917"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32447"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9463" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380"/>
        <description>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:19.986-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:08.911-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:11.727-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9463 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:27.084-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:35.282-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39570"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39466"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39720"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39691"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39583"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39280"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39727"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39575"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39724"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.6-1.el4_8" test_ref="oval:org.mitre.oval:tst:39525"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39481"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.6-1.el4_8" test_ref="oval:org.mitre.oval:tst:38755"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39675"/>
            <criterion comment="firefox is earlier than 0:3.0.15-3.el4" test_ref="oval:org.mitre.oval:tst:39710"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39683"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39031"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39547"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39753"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39602"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39541"/>
            <criterion comment="nspr is earlier than 0:4.7.6-1.el5_4" test_ref="oval:org.mitre.oval:tst:39168"/>
            <criterion comment="firefox is earlier than 0:3.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39294"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.6-1.el5_4" test_ref="oval:org.mitre.oval:tst:39579"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39636"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9462" version="5" class="vulnerability">
      <metadata>
        <title>The client for CVS before 1.11 allows a remote malicious CVS server to create arbitrary files using certain RCS diff files that use absolute pathnames during checkouts or updates, a different vulnerability than CVE-2004-0405.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0180"/>
        <description>The client for CVS before 1.11 allows a remote malicious CVS server to create arbitrary files using certain RCS diff files that use absolute pathnames during checkouts or updates, a different vulnerability than CVE-2004-0405.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:58.113-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:08.727-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:11.529-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9462 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:02.375-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:34.954-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="cvs is earlier than 0:1.11.2-18" test_ref="oval:org.mitre.oval:tst:30704"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9459" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.6 and SeaMonkey before 1.1.15 do not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0357"/>
        <description>Mozilla Firefox before 3.0.6 and SeaMonkey before 1.1.15 do not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:42.242-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:07.602-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:10.290-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9459 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:20.171-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:33.401-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38173"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38181"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38221"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38323"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38337"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:37355"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38135"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38326"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38186"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38184"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-3.el4" test_ref="oval:org.mitre.oval:tst:38343"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38228"/>
            <criterion comment="firefox is earlier than 0:3.0.6-1.el4" test_ref="oval:org.mitre.oval:tst:37823"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-3.el4" test_ref="oval:org.mitre.oval:tst:37923"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:37943"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-3.el4" test_ref="oval:org.mitre.oval:tst:38172"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:37433"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38309"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38278"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:37933"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:37808"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:37350"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:37835"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:37556"/>
            <criterion comment="firefox is earlier than 0:3.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:38272"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:38040"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:37867"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9458" version="5" class="vulnerability">
      <metadata>
        <title>Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0542"/>
        <description>Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:25.123-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:07.394-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:10.070-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9458 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:02.114-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:33.111-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-26.ent" test_ref="oval:org.mitre.oval:tst:30072"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-26.ent" test_ref="oval:org.mitre.oval:tst:30465"/>
          <criterion comment="httpd is earlier than 0:2.0.46-26.ent" test_ref="oval:org.mitre.oval:tst:30309"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9455" version="5" class="vulnerability">
      <metadata>
        <title>The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303"/>
        <description>The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:50.725-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:06.661-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:09.324-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9455 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:42.824-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:32.096-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38597"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38375"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38403"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38521"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38542"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:37726"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38677"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38096"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38577"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38540"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38634"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-23.el4" test_ref="oval:org.mitre.oval:tst:38562"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38697"/>
            <criterion comment="firefox is earlier than 0:3.0.9-1.el4" test_ref="oval:org.mitre.oval:tst:38379"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38716"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38190"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38685"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38596"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38308"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38633"/>
            <criterion comment="firefox is earlier than 0:3.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38370"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.22-2.el5_3" test_ref="oval:org.mitre.oval:tst:38801"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38462"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9454" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the scan_cidfont function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted (1) CMap and (2) CIDFont font data with modified item counts in the (a) begincodespacerange, (b) cidrange, and (c) notdefrange sections.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740"/>
        <description>Integer overflow in the scan_cidfont function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted (1) CMap and (2) CIDFont font data with modified item counts in the (a) begincodespacerange, (b) cidrange, and (c) notdefrange sections.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:28.193-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:05.836-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:08.476-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9454 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:14.116-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:31.133-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32914"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32731"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32743"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:33049"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:33018"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32923"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:33030"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32967"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32863"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32067"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32995"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32642"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32901"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32927"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32766"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32821"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32286"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32798"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32943"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32071"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32966"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32931"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32847"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32849"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32945"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32827"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32897"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:33027"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32324"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-113.EL" test_ref="oval:org.mitre.oval:tst:32850"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32455"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32518"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32775"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32899"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32949"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32941"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:33005"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32769"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32227"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:33008"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32830"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32907"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:33034"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32741"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32935"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32792"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32908"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.13.37.2" test_ref="oval:org.mitre.oval:tst:32709"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9453" version="5" class="vulnerability">
      <metadata>
        <title>The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895"/>
        <description>The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:22.749-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:05.111-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:07.811-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9453 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:17.289-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:30.270-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39591"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39396"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39586"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39171"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39299"/>
            <criterion comment="kernel is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39151"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39468"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39460"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:38810"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39101"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39357"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:38568"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39331"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39316"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39054"/>
            <criterion comment="kernel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39274"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39407"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39435"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:39442"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-89.0.11.EL" test_ref="oval:org.mitre.oval:tst:38473"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38128"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38668"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38883"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38948"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38732"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38969"/>
            <criterion comment="kernel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38991"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:39056"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38817"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:39009"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38672"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38983"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9450" version="5" class="vulnerability">
      <metadata>
        <title>The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1070"/>
        <description>The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:17.298-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:04.469-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:07.182-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9450 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:23.113-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:29.429-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30934"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30708"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30577"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30874"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30794"/>
          <criterion comment="kernel is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30892"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30873"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:31080"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30866"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:945" version="4" class="vulnerability">
      <metadata>
        <title>Racoon IKE Daemon Unauthorized X.509 Certificate Connection Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0155"/>
        <description>The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-middle attacks using a valid, trusted X.509 certificate.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-12T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-06-16T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-30T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:22.509-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:10.312-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.756-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T20:54:36.869-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:46.730-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="ipsec-tools version is less than 0.2.5-0.4" negate="false" test_ref="oval:org.mitre.oval:tst:1430"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="racoon is listening on the network" negate="false" test_ref="oval:org.mitre.oval:tst:1429"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9445" version="5" class="vulnerability">
      <metadata>
        <title>pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2069"/>
        <description>pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:33.275-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:03.002-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:05.627-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9445 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:29.982-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:27.229-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openldap-devel is earlier than 0:2.0.27-20" test_ref="oval:org.mitre.oval:tst:32018"/>
            <criterion comment="openldap-clients is earlier than 0:2.0.27-20" test_ref="oval:org.mitre.oval:tst:31815"/>
            <criterion comment="nss_ldap is earlier than 0:207-17" test_ref="oval:org.mitre.oval:tst:32179"/>
            <criterion comment="openldap is earlier than 0:2.0.27-20" test_ref="oval:org.mitre.oval:tst:32086"/>
            <criterion comment="openldap-servers is earlier than 0:2.0.27-20" test_ref="oval:org.mitre.oval:tst:31961"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="compat-openldap is earlier than 0:2.1.30-4" test_ref="oval:org.mitre.oval:tst:32065"/>
            <criterion comment="openldap-devel is earlier than 0:2.2.13-4" test_ref="oval:org.mitre.oval:tst:32089"/>
            <criterion comment="openldap-clients is earlier than 0:2.2.13-4" test_ref="oval:org.mitre.oval:tst:31874"/>
            <criterion comment="nss_ldap is earlier than 0:226-10" test_ref="oval:org.mitre.oval:tst:31977"/>
            <criterion comment="openldap is earlier than 0:2.2.13-4" test_ref="oval:org.mitre.oval:tst:31301"/>
            <criterion comment="openldap-servers-sql is earlier than 0:2.2.13-4" test_ref="oval:org.mitre.oval:tst:32188"/>
            <criterion comment="openldap-servers is earlier than 0:2.2.13-4" test_ref="oval:org.mitre.oval:tst:32059"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9442" version="5" class="vulnerability">
      <metadata>
        <title>snmp_api.c in snmpd in Net-SNMP 5.2.x before 5.2.2, 5.1.x before 5.1.3, and 5.0.x before 5.0.10.2, when running in master agentx mode, allows remote attackers to cause a denial of service (crash) by causing a particular TCP disconnect, which triggers a free of an incorrect variable, a different vulnerability than CVE-2005-2177.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-4837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4837"/>
        <description>snmp_api.c in snmpd in Net-SNMP 5.2.x before 5.2.2, 5.1.x before 5.1.3, and 5.0.x before 5.0.10.2, when running in master agentx mode, allows remote attackers to cause a denial of service (crash) by causing a particular TCP disconnect, which triggers a free of an incorrect variable, a different vulnerability than CVE-2005-2177.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:42.892-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:02.154-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:04.707-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9442 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:58.168-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:25.889-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31395"/>
            <criterion comment="net-snmp is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:30763"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31684"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31547"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31390"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31408"/>
            <criterion comment="net-snmp is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:30993"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31414"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31691"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31766"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9437" version="5" class="vulnerability">
      <metadata>
        <title>The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624"/>
        <description>The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:25.836-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:01.149-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:03.663-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9437 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:24.591-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:24.440-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32436"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32311"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32279"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.36" test_ref="oval:org.mitre.oval:tst:32437"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32507"/>
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.36" test_ref="oval:org.mitre.oval:tst:32206"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32377"/>
            <criterion comment="xpdf is earlier than 1:2.02-9.8" test_ref="oval:org.mitre.oval:tst:31474"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:31613"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.36" test_ref="oval:org.mitre.oval:tst:31553"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32260"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:32395"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32095"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:31805"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32489"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.10" test_ref="oval:org.mitre.oval:tst:32284"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32199"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.4" test_ref="oval:org.mitre.oval:tst:32545"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.10" test_ref="oval:org.mitre.oval:tst:32254"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32308"/>
            <criterion comment="xpdf is earlier than 1:3.00-11.10" test_ref="oval:org.mitre.oval:tst:32152"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32333"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32317"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.10" test_ref="oval:org.mitre.oval:tst:32499"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9436" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 0.9.1 and 0.9.2 allows remote web sites to spoof certificates of trusted web sites via redirects and Javascript that uses the "onunload" method.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0763"/>
        <description>Mozilla Firefox 0.9.1 and 0.9.2 allows remote web sites to spoof certificates of trusted web sites via redirects and Javascript that uses the "onunload" method.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:47.229-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:00.800-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:03.362-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9436 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:42.911-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:24.012-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9435" version="5" class="vulnerability">
      <metadata>
        <title>init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0403"/>
        <description>init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:44.891-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:00.517-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:03.073-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9435 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:08.332-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:23.649-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31148"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31473"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31178"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31282"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31565"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31562"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31582"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:30730"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31534"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9433" version="5" class="vulnerability">
      <metadata>
        <title>The AIM dissector in Ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error) via unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0505"/>
        <description>The AIM dissector in Ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error) via unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:26.948-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:12:00.135-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:02.628-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9433 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:03.557-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:23.074-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.10.3-0.30E.2" test_ref="oval:org.mitre.oval:tst:30484"/>
          <criterion comment="ethereal is earlier than 0:0.10.3-0.30E.2" test_ref="oval:org.mitre.oval:tst:30678"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9432" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807"/>
        <description>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:35.473-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:59.492-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:01.987-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9432 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:09.431-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:22.270-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37286"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37033"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37126"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37105"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37271"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37279"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37060"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37189"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36476"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36916"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37192"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-14.el4" test_ref="oval:org.mitre.oval:tst:36999"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36886"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37331"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36365"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.19.el4" test_ref="oval:org.mitre.oval:tst:37174"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37226"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36766"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36826"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37274"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37107"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:37351"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.16-1.el5" test_ref="oval:org.mitre.oval:tst:37363"/>
            <criterion comment="xulrunner is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36984"/>
            <criterion comment="devhelp is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37234"/>
            <criterion comment="yelp is earlier than 0:2.16.0-19.el5" test_ref="oval:org.mitre.oval:tst:37291"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36436"/>
            <criterion comment="firefox is earlier than 0:3.0-2.el5" test_ref="oval:org.mitre.oval:tst:36814"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9429" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500"/>
        <description>Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:53.449-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:59.117-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:01.580-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9429 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:02.588-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:21.639-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="gaim is earlier than 1:0.82.1-0.RHEL3" test_ref="oval:org.mitre.oval:tst:30434"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9427" version="5" class="vulnerability">
      <metadata>
        <title>The OSS code for the Sound Blaster (sb16) driver in Linux 2.4.x before 2.4.26, when operating in 16 bit mode, does not properly handle certain sample sizes, which allows local users to cause a denial of service (crash) via a sample with an odd number of bytes.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0178"/>
        <description>The OSS code for the Sound Blaster (sb16) driver in Linux 2.4.x before 2.4.26, when operating in 16 bit mode, does not properly handle certain sample sizes, which allows local users to cause a denial of service (crash) via a sample with an odd number of bytes.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:05.363-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:58.787-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:01.281-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9427 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:20.216-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:21.277-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30827"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30622"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30627"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30676"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30823"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30750"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30596"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30833"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30830"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9426" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0554"/>
        <description>Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:34.123-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:58.500-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:00.953-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9426 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:36.883-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:20.509-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.0.2.EL" test_ref="oval:org.mitre.oval:tst:30449"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.0.2.EL" test_ref="oval:org.mitre.oval:tst:30739"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.0.2.EL" test_ref="oval:org.mitre.oval:tst:30418"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.0.2.EL" test_ref="oval:org.mitre.oval:tst:30721"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.0.2.EL" test_ref="oval:org.mitre.oval:tst:30772"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.0.2.EL" test_ref="oval:org.mitre.oval:tst:30655"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.0.2.EL" test_ref="oval:org.mitre.oval:tst:30574"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.0.2.EL" test_ref="oval:org.mitre.oval:tst:30681"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.0.2.EL" test_ref="oval:org.mitre.oval:tst:30207"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9424" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872"/>
        <description>Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:35.882-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:57.755-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:13:00.128-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9424 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:45.125-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:19.563-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35216"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35012"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34787"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35164"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34818"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35171"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34820"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35008"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34796"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35363"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35010"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35249"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34683"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34365"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34976"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35087"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35298"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35289"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35309"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35263"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35279"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34964"/>
            <criterion comment="php-common is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34896"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35084"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35078"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34802"/>
            <criterion comment="php is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35270"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35361"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34769"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35108"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35037"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34943"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34689"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35221"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35077"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34934"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35170"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34376"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34764"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9423" version="5" class="vulnerability">
      <metadata>
        <title>kmod in the Linux kernel does not set its uid, suid, gid, or sgid to 0, which allows local users to cause a denial of service (crash) by sending certain signals to kmod.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-1040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1040"/>
        <description>kmod in the Linux kernel does not set its uid, suid, gid, or sgid to 0, which allows local users to cause a denial of service (crash) by sending certain signals to kmod.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:30.259-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:57.474-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:59.788-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9423 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:25.887-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:19.190-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30346"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30006"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30702"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30513"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30280"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30056"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30508"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30654"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30307"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9419" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to hijack the user interface via the "chrome" flag and XML User Interface Language (XUL) files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0764"/>
        <description>Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to hijack the user interface via the "chrome" flag and XML User Interface Language (XUL) files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:14.920-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:56.519-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:58.782-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9419 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:24.571-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:17.575-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9417" version="5" class="vulnerability">
      <metadata>
        <title>Array index error in the hb_ot_layout_build_glyph_classes function in pango/opentype/hb-ot-layout.cc in Pango before 1.27.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted font file, related to building a synthetic Glyph Definition (aka GDEF) table by using this font's charmap and the Unicode property database.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0421"/>
        <description>Array index error in the hb_ot_layout_build_glyph_classes function in pango/opentype/hb-ot-layout.cc in Pango before 1.27.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted font file, related to building a synthetic Glyph Definition (aka GDEF) table by using this font's charmap and the Unicode property database.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:09.987-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:56.197-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:58.449-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9417 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:21.761-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:17.012-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="pango-devel is earlier than 0:1.2.5-10" test_ref="oval:org.mitre.oval:tst:40152"/>
            <criterion comment="pango is earlier than 0:1.2.5-10" test_ref="oval:org.mitre.oval:tst:39329"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="pango-devel is earlier than 0:1.6.0-16.el4_8" test_ref="oval:org.mitre.oval:tst:39573"/>
            <criterion comment="evolution28-pango-devel is earlier than 0:1.14.9-13.el4_8" test_ref="oval:org.mitre.oval:tst:40323"/>
            <criterion comment="pango is earlier than 0:1.6.0-16.el4_8" test_ref="oval:org.mitre.oval:tst:39891"/>
            <criterion comment="evolution28-pango is earlier than 0:1.14.9-13.el4_8" test_ref="oval:org.mitre.oval:tst:39360"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="pango-devel is earlier than 0:1.14.9-8.el5" test_ref="oval:org.mitre.oval:tst:40132"/>
            <criterion comment="pango is earlier than 0:1.14.9-8.el5" test_ref="oval:org.mitre.oval:tst:40189"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9415" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0962"/>
        <description>Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:03.486-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:55.965-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:58.249-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9415 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:57.194-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:16.743-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="rsync is earlier than 0:2.5.7-1" test_ref="oval:org.mitre.oval:tst:30221"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9414" version="5" class="vulnerability">
      <metadata>
        <title>The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615"/>
        <description>The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:49.763-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:55.517-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:57.734-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9414 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:08.899-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:16.114-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="pidgin is earlier than 0:1.5.1-6.el3" test_ref="oval:org.mitre.oval:tst:39353"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="finch-devel is earlier than 0:2.6.3-2.el4" test_ref="oval:org.mitre.oval:tst:39708"/>
            <criterion comment="libpurple is earlier than 0:2.6.3-2.el4" test_ref="oval:org.mitre.oval:tst:39368"/>
            <criterion comment="libpurple-perl is earlier than 0:2.6.3-2.el4" test_ref="oval:org.mitre.oval:tst:39729"/>
            <criterion comment="libpurple-tcl is earlier than 0:2.6.3-2.el4" test_ref="oval:org.mitre.oval:tst:39606"/>
            <criterion comment="pidgin-devel is earlier than 0:2.6.3-2.el4" test_ref="oval:org.mitre.oval:tst:39458"/>
            <criterion comment="libpurple-devel is earlier than 0:2.6.3-2.el4" test_ref="oval:org.mitre.oval:tst:39406"/>
            <criterion comment="finch is earlier than 0:2.6.3-2.el4" test_ref="oval:org.mitre.oval:tst:39382"/>
            <criterion comment="pidgin-perl is earlier than 0:2.6.3-2.el4" test_ref="oval:org.mitre.oval:tst:39309"/>
            <criterion comment="pidgin is earlier than 0:2.6.3-2.el4" test_ref="oval:org.mitre.oval:tst:39454"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="finch-devel is earlier than 0:2.6.3-2.el5" test_ref="oval:org.mitre.oval:tst:39342"/>
            <criterion comment="libpurple is earlier than 0:2.6.3-2.el5" test_ref="oval:org.mitre.oval:tst:39335"/>
            <criterion comment="libpurple-perl is earlier than 0:2.6.3-2.el5" test_ref="oval:org.mitre.oval:tst:39751"/>
            <criterion comment="libpurple-tcl is earlier than 0:2.6.3-2.el5" test_ref="oval:org.mitre.oval:tst:39174"/>
            <criterion comment="pidgin-devel is earlier than 0:2.6.3-2.el5" test_ref="oval:org.mitre.oval:tst:39298"/>
            <criterion comment="libpurple-devel is earlier than 0:2.6.3-2.el5" test_ref="oval:org.mitre.oval:tst:39584"/>
            <criterion comment="finch is earlier than 0:2.6.3-2.el5" test_ref="oval:org.mitre.oval:tst:39392"/>
            <criterion comment="pidgin-perl is earlier than 0:2.6.3-2.el5" test_ref="oval:org.mitre.oval:tst:39508"/>
            <criterion comment="pidgin is earlier than 0:2.6.3-2.el5" test_ref="oval:org.mitre.oval:tst:39728"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9413" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the ole_info_read_metabat function in Gnome Structured File library (libgsf) 1.14.0, and other versions before 1.14.2, allows context-dependent attackers to execute arbitrary code via a large num_metabat value in an OLE document, which causes the ole_init_info function to allocate insufficient memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4514"/>
        <description>Heap-based buffer overflow in the ole_info_read_metabat function in Gnome Structured File library (libgsf) 1.14.0, and other versions before 1.14.2, allows context-dependent attackers to execute arbitrary code via a large num_metabat value in an OLE document, which causes the ole_init_info function to allocate insufficient memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:22:29.075-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:55.275-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:57.476-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9413 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:56.540-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:15.688-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libgsf is earlier than 0:1.6.0-7" test_ref="oval:org.mitre.oval:tst:33304"/>
            <criterion comment="libgsf-devel is earlier than 0:1.6.0-7" test_ref="oval:org.mitre.oval:tst:32479"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libgsf is earlier than 0:1.10.1-2" test_ref="oval:org.mitre.oval:tst:33333"/>
            <criterion comment="libgsf-devel is earlier than 0:1.10.1-2" test_ref="oval:org.mitre.oval:tst:33257"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9412" version="5" class="vulnerability">
      <metadata>
        <title>Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007"/>
        <description>Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:59.884-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:54.451-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:56.800-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9412 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:23.076-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:14.843-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35915"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35794"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36513"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36264"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36161"/>
            <criterion comment="kernel is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36518"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36597"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36612"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36171"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36201"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36534"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36373"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36702"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36615"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36490"/>
            <criterion comment="kernel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36370"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:35738"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36249"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36731"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:35733"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36107"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36600"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36529"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36526"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36442"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36238"/>
            <criterion comment="kernel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36463"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36480"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:35876"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36532"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36278"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:35724"/>
            <criterion comment="kernel-debuginfo-common is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36560"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9411" version="5" class="vulnerability">
      <metadata>
        <title>sysreport before 1.3.7 allows local users to obtain sensitive information via a symlink attack on a temporary directory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2104"/>
        <description>sysreport before 1.3.7 allows local users to obtain sensitive information via a symlink attack on a temporary directory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:49.875-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:54.230-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:56.560-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9411 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:55.250-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:14.315-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="sysreport is earlier than 0:1.3.7.2-9" test_ref="oval:org.mitre.oval:tst:31930"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="sysreport is earlier than 0:1.3.15-5" test_ref="oval:org.mitre.oval:tst:31910"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:941" version="4" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 Squid ACL Bypass Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0189"/>
        <description>The "%xx" URL decoding function in Squid 2.5STABLE4 and earlier allows remote attackers to bypass url_regex ACLs via a URL with a NULL ("%00") characterm, which causes Squid to use only a portion of the requested URL when comparing it against the access control lists.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:32.635-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:10.144-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.366-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T21:00:44.025-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:46.445-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="squid version is less than 2.5.STABLE3-5.3E" negate="false" test_ref="oval:org.mitre.oval:tst:1431"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="squid is listening on the network" negate="false" test_ref="oval:org.mitre.oval:tst:1532"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9408" version="5" class="vulnerability">
      <metadata>
        <title>Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0100"/>
        <description>Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:47.264-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:53.313-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:55.622-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9408 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:02:57.349-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:13.074-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xemacs-el is earlier than 0:21.4.13-8.ent.1" test_ref="oval:org.mitre.oval:tst:31334"/>
            <criterion comment="xemacs is earlier than 0:21.4.13-8.ent.1" test_ref="oval:org.mitre.oval:tst:31358"/>
            <criterion comment="xemacs-info is earlier than 0:21.4.13-8.ent.1" test_ref="oval:org.mitre.oval:tst:31061"/>
            <criterion comment="emacs-el is earlier than 0:21.3-4.1" test_ref="oval:org.mitre.oval:tst:31186"/>
            <criterion comment="emacs-leim is earlier than 0:21.3-4.1" test_ref="oval:org.mitre.oval:tst:30740"/>
            <criterion comment="emacs is earlier than 0:21.3-4.1" test_ref="oval:org.mitre.oval:tst:31379"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xemacs-nox is earlier than 0:21.4.15-10.EL.1" test_ref="oval:org.mitre.oval:tst:30840"/>
            <criterion comment="emacs-nox is earlier than 0:21.3-19.EL.1" test_ref="oval:org.mitre.oval:tst:31124"/>
            <criterion comment="xemacs-el is earlier than 0:21.4.15-10.EL.1" test_ref="oval:org.mitre.oval:tst:31326"/>
            <criterion comment="emacs-el is earlier than 0:21.3-19.EL.1" test_ref="oval:org.mitre.oval:tst:30860"/>
            <criterion comment="emacs-leim is earlier than 0:21.3-19.EL.1" test_ref="oval:org.mitre.oval:tst:31288"/>
            <criterion comment="emacs is earlier than 0:21.3-19.EL.1" test_ref="oval:org.mitre.oval:tst:31389"/>
            <criterion comment="emacs-common is earlier than 0:21.3-19.EL.1" test_ref="oval:org.mitre.oval:tst:31328"/>
            <criterion comment="xemacs is earlier than 0:21.4.15-10.EL.1" test_ref="oval:org.mitre.oval:tst:31171"/>
            <criterion comment="xemacs-info is earlier than 0:21.4.15-10.EL.1" test_ref="oval:org.mitre.oval:tst:30965"/>
            <criterion comment="xemacs-common is earlier than 0:21.4.15-10.EL.1" test_ref="oval:org.mitre.oval:tst:31034"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9406" version="5" class="vulnerability">
      <metadata>
        <title>Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0984"/>
        <description>Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:10.680-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:52.687-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:54.943-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9406 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:37.614-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:12.136-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30346"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30006"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30702"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30513"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30280"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30056"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30508"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30654"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30307"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9405" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) by changing the (1) -moz-grid and (2) -moz-grid-group display styles.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738"/>
        <description>Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) by changing the (1) -moz-grid and (2) -moz-grid-group display styles.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:42.534-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:52.201-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:54.433-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9405 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:09.273-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:11.464-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9402" version="5" class="vulnerability">
      <metadata>
        <title>The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0069"/>
        <description>The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:06.609-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:51.611-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:53.825-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9402 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:10.954-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:10.653-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.30E.3" test_ref="oval:org.mitre.oval:tst:31098"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.30E.3" test_ref="oval:org.mitre.oval:tst:30910"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.30E.3" test_ref="oval:org.mitre.oval:tst:31254"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.30E.3" test_ref="oval:org.mitre.oval:tst:30835"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.30E.3" test_ref="oval:org.mitre.oval:tst:30437"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31180"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31161"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31316"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31312"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.40E.4" test_ref="oval:org.mitre.oval:tst:31163"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:940" version="2" class="vulnerability">
      <metadata>
        <title>Linux Kernel ISO9660 File System Component BO</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0109"/>
        <description>Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:31.517-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:09.969-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criteria operator="OR" comment="kernel versions">
            <criterion comment="kernel version is less than 2.4.21-9.0.3.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1436"/>
            <criterion comment="kernel-smp version is less than 2.4.21-9.0.3.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1435"/>
            <criterion comment="kernel-hugemem version is less than 2.4.21-9.0.3.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1434"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="AND" comment="/bin/mount is world-executable AND Set-UID">
            <criterion comment="/bin/mount is world-executable AND Set-UID" negate="false" test_ref="oval:org.mitre.oval:tst:1433"/>
            <criterion comment="/bin/mount is world-executable AND Set-UID" negate="false" test_ref="oval:org.mitre.oval:tst:1432"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9398" version="5" class="vulnerability">
      <metadata>
        <title>Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0587"/>
        <description>Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:22.284-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:50.968-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:53.206-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9398 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:13.190-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:09.815-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30827"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30622"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30627"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30676"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30823"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30750"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30596"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30833"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30830"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9396" version="5" class="vulnerability">
      <metadata>
        <title>Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858"/>
        <description>Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:57.736-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:50.315-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:52.483-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9396 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:13.301-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:08.817-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32525"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32366"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32381"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32215"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32464"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32288"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:31978"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32438"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32070"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32415"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32137"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32528"/>
            <criterion comment="kernel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:31866"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32446"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32450"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9393" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in libUil (libUil.so) in OpenMotif 2.2.3, and possibly other versions, allows attackers to execute arbitrary code via the (1) diag_issue_diagnostic function in UilDiags.c and (2) open_source_file function in UilSrcSrc.c.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3964"/>
        <description>Multiple buffer overflows in libUil (libUil.so) in OpenMotif 2.2.3, and possibly other versions, allows attackers to execute arbitrary code via the (1) diag_issue_diagnostic function in UilDiags.c and (2) open_source_file function in UilSrcSrc.c.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:32.388-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:49.961-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:52.189-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9393 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:25.066-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:08.417-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openmotif21 is earlier than 0:2.1.30-9.RHEL3.7" test_ref="oval:org.mitre.oval:tst:32680"/>
            <criterion comment="openmotif-devel is earlier than 0:2.2.3-5.RHEL3.3" test_ref="oval:org.mitre.oval:tst:32681"/>
            <criterion comment="openmotif is earlier than 0:2.2.3-5.RHEL3.3" test_ref="oval:org.mitre.oval:tst:32716"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openmotif21 is earlier than 0:2.1.30-11.RHEL4.5" test_ref="oval:org.mitre.oval:tst:32013"/>
            <criterion comment="openmotif-devel is earlier than 0:2.2.3-10.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32468"/>
            <criterion comment="openmotif is earlier than 0:2.2.3-10.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32612"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9392" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in (1) tif_dirread.c and (2) tif_fax3.c for libtiff 3.5.7 and 3.7.0 allows remote attackers to execute arbitrary code via a TIFF file containing a TIFF_ASCII or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1308"/>
        <description>Integer overflow in (1) tif_dirread.c and (2) tif_fax3.c for libtiff 3.5.7 and 3.7.0 allows remote attackers to execute arbitrary code via a TIFF file containing a TIFF_ASCII or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:41.137-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:49.719-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:51.886-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9392 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:43.369-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:07.964-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.5.7-22.el3" test_ref="oval:org.mitre.oval:tst:31219"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-22.el3" test_ref="oval:org.mitre.oval:tst:30876"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-8" test_ref="oval:org.mitre.oval:tst:31174"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-8" test_ref="oval:org.mitre.oval:tst:30884"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:939" version="2" class="vulnerability">
      <metadata>
        <title>Linux Kernel ip_setsockopt Integer Overflow</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0424"/>
        <description>Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-05-10T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:59.136-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:09.758-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criteria operator="OR" comment="kernel versions">
          <criterion comment="kernel version is less than 2.4.21-9.0.3.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1436"/>
          <criterion comment="kernel-smp version is less than 2.4.21-9.0.3.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1435"/>
          <criterion comment="kernel-hugemem version is less than 2.4.21-9.0.3.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1434"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9386" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors involving (1) an event handler attached to an outer window, (2) a SCRIPT element in an unloaded document, or (3) the onreadystatechange handler in conjunction with an XMLHttpRequest.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800"/>
        <description>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors involving (1) an event handler attached to an outer window, (2) a SCRIPT element in an unloaded document, or (3) the onreadystatechange handler in conjunction with an XMLHttpRequest.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:21.390-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:48.607-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:50.664-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9386 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:27.340-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:06.367-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37286"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37033"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37126"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37105"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37271"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37279"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37060"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37189"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36476"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36916"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37192"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-14.el4" test_ref="oval:org.mitre.oval:tst:36999"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36886"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37331"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36365"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.19.el4" test_ref="oval:org.mitre.oval:tst:37174"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37226"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36766"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36826"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37274"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37107"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:37351"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.16-1.el5" test_ref="oval:org.mitre.oval:tst:37363"/>
            <criterion comment="xulrunner is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36984"/>
            <criterion comment="devhelp is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37234"/>
            <criterion comment="yelp is earlier than 0:2.16.0-19.el5" test_ref="oval:org.mitre.oval:tst:37291"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36436"/>
            <criterion comment="firefox is earlier than 0:3.0-2.el5" test_ref="oval:org.mitre.oval:tst:36814"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9378" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the SOAPParameter object constructor in (1) Netscape version 7.0 and 7.1 and (2) Mozilla 1.6, and possibly earlier versions, allows remote attackers to execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0722"/>
        <description>Integer overflow in the SOAPParameter object constructor in (1) Netscape version 7.0 and 7.1 and (2) Mozilla 1.6, and possibly earlier versions, allows remote attackers to execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:31.789-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:46.824-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:48.666-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9378 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:21.104-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:03.190-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9376" version="6" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL that redirects to the target resource, which generates an error if the target data does not have JavaScript syntax, which can be accessed using the window.onerror DOM API.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507"/>
        <description>Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL that redirects to the target resource, which generates an error if the target data does not have JavaScript syntax, which can be accessed using the window.onerror DOM API.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:41.611-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:46.143-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:47.971-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9376 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:44.607-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:02.322-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38137"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37886"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37999"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37907"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37709"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38092"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37745"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38039"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38062"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38073"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37574"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38071"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37857"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-18.el4" test_ref="oval:org.mitre.oval:tst:37200"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37812"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el4" test_ref="oval:org.mitre.oval:tst:38080"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37139"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37869"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37789"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37395"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38118"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:38072"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38037"/>
            <criterion comment="nspr is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37420"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37854"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.19-1.el5_2" test_ref="oval:org.mitre.oval:tst:38053"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37419"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38083"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:37631"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38114"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37737"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37403"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9373" version="5" class="vulnerability">
      <metadata>
        <title>The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1168"/>
        <description>The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:42.556-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:45.490-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:47.326-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9373 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:36.486-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:01.332-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="ncompress is earlier than 0:4.2.4-39.rhel3" test_ref="oval:org.mitre.oval:tst:32891"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="ncompress is earlier than 0:4.2.4-43.rhel4" test_ref="oval:org.mitre.oval:tst:32529"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9370" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738"/>
        <description>Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:56.422-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:44.766-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:46.354-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9370 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:53.800-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:19:00.454-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.21" test_ref="oval:org.mitre.oval:tst:32990"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.21" test_ref="oval:org.mitre.oval:tst:32592"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-33.21" test_ref="oval:org.mitre.oval:tst:32812"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-16.46" test_ref="oval:org.mitre.oval:tst:32771"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-43.14" test_ref="oval:org.mitre.oval:tst:32875"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-43.14" test_ref="oval:org.mitre.oval:tst:33058"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-43.14" test_ref="oval:org.mitre.oval:tst:33093"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-22.46" test_ref="oval:org.mitre.oval:tst:32789"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:937" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 Mozilla Zombie Document Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0191"/>
        <description>Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-04-08T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-05T12:00:00.000-04:00">INTERIM</status_change>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:32.073-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:09.540-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criterion comment="mozilla-nss version is less than 1.4.2-3.0.2" negate="false" test_ref="oval:org.mitre.oval:tst:1468"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9367" version="5" class="vulnerability">
      <metadata>
        <title>The CMsgReader::readRect function in the VNC Viewer component in RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0 through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote VNC servers to execute arbitrary code via crafted RFB protocol data, related to "encoding type."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4770"/>
        <description>The CMsgReader::readRect function in the VNC Viewer component in RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0 through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote VNC servers to execute arbitrary code via crafted RFB protocol data, related to "encoding type."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:58.120-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:44.212-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:45.699-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9367 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:40.958-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:59.580-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vnc-server is earlier than 0:4.0-0.beta4.1.8" test_ref="oval:org.mitre.oval:tst:38057"/>
            <criterion comment="vnc is earlier than 0:4.0-0.beta4.1.8" test_ref="oval:org.mitre.oval:tst:38376"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vnc-server is earlier than 0:4.0-12.el4_7.1" test_ref="oval:org.mitre.oval:tst:38179"/>
            <criterion comment="vnc is earlier than 0:4.0-12.el4_7.1" test_ref="oval:org.mitre.oval:tst:38424"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vnc-server is earlier than 0:4.1.2-14.el5_3.1" test_ref="oval:org.mitre.oval:tst:38345"/>
            <criterion comment="vnc is earlier than 0:4.1.2-14.el5_3.1" test_ref="oval:org.mitre.oval:tst:38082"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9364" version="5" class="vulnerability">
      <metadata>
        <title>The sbni_ioctl function in drivers/net/wan/sbni.c in the wan subsystem in the Linux kernel 2.6.26.3 does not check for the CAP_NET_ADMIN capability before processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3) SIOCDEVENSLAVE, or (4) SIOCDEVEMANSIPATE ioctl request, which allows local users to bypass intended capability restrictions.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525"/>
        <description>The sbni_ioctl function in drivers/net/wan/sbni.c in the wan subsystem in the Linux kernel 2.6.26.3 does not check for the CAP_NET_ADMIN capability before processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3) SIOCDEVENSLAVE, or (4) SIOCDEVEMANSIPATE ioctl request, which allows local users to bypass intended capability restrictions.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:01.405-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:43.904-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:45.404-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9364 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:58.584-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:58.657-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37931"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37846"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37817"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37663"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37799"/>
          <criterion comment="kernel is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37028"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37885"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37981"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37117"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9363" version="5" class="vulnerability">
      <metadata>
        <title>The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095"/>
        <description>The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:30.129-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:43.544-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:44.985-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9363 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:51.358-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:58.109-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-77.ent" test_ref="oval:org.mitre.oval:tst:39637"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-77.ent" test_ref="oval:org.mitre.oval:tst:39671"/>
            <criterion comment="httpd is earlier than 0:2.0.46-77.ent" test_ref="oval:org.mitre.oval:tst:39611"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39448"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39501"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:38802"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39716"/>
            <criterion comment="httpd is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39551"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-manual is earlier than 0:2.2.3-31.el5_4.2" test_ref="oval:org.mitre.oval:tst:39267"/>
            <criterion comment="httpd-devel is earlier than 0:2.2.3-31.el5_4.2" test_ref="oval:org.mitre.oval:tst:39640"/>
            <criterion comment="mod_ssl is earlier than 0:2.2.3-31.el5_4.2" test_ref="oval:org.mitre.oval:tst:39613"/>
            <criterion comment="httpd is earlier than 0:2.2.3-31.el5_4.2" test_ref="oval:org.mitre.oval:tst:39756"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9358" version="5" class="vulnerability">
      <metadata>
        <title>PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-4136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136"/>
        <description>PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:37.084-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:42.412-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:43.815-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9358 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:55.956-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:56.517-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40180"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40440"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40426"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40220"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:39618"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40140"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40502"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:39925"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40137"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40551"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.21-3" test_ref="oval:org.mitre.oval:tst:40106"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40486"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40521"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40292"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40516"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40066"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40399"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40512"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40314"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40428"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40366"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.29-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:40465"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40401"/>
            <criterion comment="postgresql-docs is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40402"/>
            <criterion comment="postgresql-pl is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40538"/>
            <criterion comment="postgresql-tcl is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:39839"/>
            <criterion comment="postgresql-libs is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40515"/>
            <criterion comment="postgresql-contrib is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40505"/>
            <criterion comment="postgresql-python is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40251"/>
            <criterion comment="postgresql-test is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40253"/>
            <criterion comment="postgresql-server is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40509"/>
            <criterion comment="postgresql-devel is earlier than 0:8.1.21-1.el5_5.1" test_ref="oval:org.mitre.oval:tst:40309"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9348" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0783"/>
        <description>Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:24.303-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:41.093-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:42.435-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9348 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:57.097-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:54.575-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-11.3.3" test_ref="oval:org.mitre.oval:tst:30887"/>
          <criterion comment="gtk2 is earlier than 0:2.2.4-8.1" test_ref="oval:org.mitre.oval:tst:30146"/>
          <criterion comment="gdk-pixbuf-gnome is earlier than 1:0.22.0-11.3.3" test_ref="oval:org.mitre.oval:tst:30822"/>
          <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-11.3.3" test_ref="oval:org.mitre.oval:tst:30571"/>
          <criterion comment="gtk2-devel is earlier than 0:2.2.4-8.1" test_ref="oval:org.mitre.oval:tst:30817"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9345" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attackers to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0247"/>
        <description>Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:08.972-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:40.585-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:41.928-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9345 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:50.234-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:53.747-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:30936"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:30803"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31436"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31064"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:30591"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31342"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31217"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31199"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31415"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31005"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31233"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31336"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31398"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31229"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:30946"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31215"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:30784"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31126"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31318"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31273"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31424"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31325"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9343" version="5" class="vulnerability">
      <metadata>
        <title>The tsearch2 module in PostgreSQL 7.4 through 8.0.x declares the (1) dex_init, (2) snb_en_init, (3) snb_ru_init, (4) spell_init, and (5) syn_init functions as "internal" even when they do not take an internal argument, which allows attackers to cause a denial of service (application crash) and possibly have other impacts via SQL commands that call other functions that accept internal arguments.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1410"/>
        <description>The tsearch2 module in PostgreSQL 7.4 through 8.0.x declares the (1) dex_init, (2) snb_en_init, (3) snb_ru_init, (4) spell_init, and (5) syn_init functions as "internal" even when they do not take an internal argument, which allows attackers to cause a denial of service (application crash) and possibly have other impacts via SQL commands that call other functions that accept internal arguments.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:51.394-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:40.121-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:41.453-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9343 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:45.620-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:53.144-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31824"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31255"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31711"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31608"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31726"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31681"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31497"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31715"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31510"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31754"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.10-1" test_ref="oval:org.mitre.oval:tst:31507"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31832"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31880"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31527"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31669"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31129"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31756"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31799"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31798"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31618"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31468"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.8-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31708"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9334" version="5" class="vulnerability">
      <metadata>
        <title>KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or truncate arbitrary files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0689"/>
        <description>KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or truncate arbitrary files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:03.458-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:38.869-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:40.614-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9334 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:26.641-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:51.932-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kdebase is earlier than 6:3.1.3-5.4" test_ref="oval:org.mitre.oval:tst:30731"/>
          <criterion comment="kdebase-devel is earlier than 6:3.1.3-5.4" test_ref="oval:org.mitre.oval:tst:29837"/>
          <criterion comment="kdelibs is earlier than 6:3.1.3-6.6" test_ref="oval:org.mitre.oval:tst:30063"/>
          <criterion comment="kdelibs-devel is earlier than 6:3.1.3-6.6" test_ref="oval:org.mitre.oval:tst:30768"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9332" version="5" class="vulnerability">
      <metadata>
        <title>Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022"/>
        <description>Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:26.745-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:38.571-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:40.317-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9332 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:30.615-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:51.455-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdebase is earlier than 6:3.1.3-5.16" test_ref="oval:org.mitre.oval:tst:34248"/>
            <criterion comment="kdebase-devel is earlier than 6:3.1.3-5.16" test_ref="oval:org.mitre.oval:tst:34656"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdebase is earlier than 6:3.3.1-5.19.rhel4" test_ref="oval:org.mitre.oval:tst:34288"/>
            <criterion comment="kdebase-devel is earlier than 6:3.3.1-5.19.rhel4" test_ref="oval:org.mitre.oval:tst:34025"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdebase is earlier than 6:3.5.4-13.6.el5" test_ref="oval:org.mitre.oval:tst:34519"/>
            <criterion comment="kdebase-devel is earlier than 6:3.5.4-13.6.el5" test_ref="oval:org.mitre.oval:tst:34351"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9330" version="5" class="vulnerability">
      <metadata>
        <title>/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0461"/>
        <description>/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:30.369-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:37.172-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:38.737-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9330 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:33.115-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:51.078-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30346"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30006"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30702"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30513"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30280"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30056"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30508"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30654"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30307"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9329" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360"/>
        <description>Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:56.990-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:36.210-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:37.782-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9329 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:41.079-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:49.923-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36946"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36579"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36881"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36895"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36542"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36866"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36934"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36951"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36973"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36756"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36632"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36469"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36368"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36851"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36740"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36985"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36805"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36754"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36734"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36918"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36499"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36402"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36931"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36752"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36976"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36867"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36115"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36794"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36943"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36905"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36908"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36685"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36662"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36309"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36944"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36641"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36607"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36651"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36977"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36939"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36385"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36979"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36933"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36742"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36873"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36932"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:35995"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-server-randr-source is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:37018"/>
            <criterion comment="xorg-x11-server-Xnest is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36836"/>
            <criterion comment="xorg-x11-server-Xvfb is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36063"/>
            <criterion comment="xorg-x11-server-Xdmx is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36029"/>
            <criterion comment="xorg-x11-server is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36986"/>
            <criterion comment="xorg-x11-server-sdk is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36380"/>
            <criterion comment="xorg-x11-server-Xephyr is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36055"/>
            <criterion comment="xorg-x11-server-Xorg is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36359"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9327" version="5" class="vulnerability">
      <metadata>
        <title>Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547"/>
        <description>Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:30.003-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:35.536-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:37.152-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9327 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:01.298-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:49.109-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39591"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39396"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39586"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39171"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39299"/>
            <criterion comment="kernel is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39151"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39468"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39460"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:38810"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39593"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39549"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39548"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39554"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39686"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39415"/>
            <criterion comment="kernel is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39557"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39560"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39587"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:39607"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-89.0.16.EL" test_ref="oval:org.mitre.oval:tst:38910"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39665"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39142"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39538"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39699"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39518"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39350"/>
            <criterion comment="kernel is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39738"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39663"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39536"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39189"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39141"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-164.6.1.el5" test_ref="oval:org.mitre.oval:tst:39179"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9323" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2701"/>
        <description>Heap-based buffer overflow in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:36.592-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:34.736-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:36.316-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9323 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:52.604-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:48.055-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32169"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:31729"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32242"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32151"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32014"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32144"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32068"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32248"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32293"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32244"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32012"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:31897"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32300"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32226"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32289"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32170"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32150"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32302"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32090"/>
            <criterion comment="firefox is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:32147"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32209"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32088"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9321" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806"/>
        <description>Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:21:09.584-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:34.314-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:35.937-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9321 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:23.944-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:47.515-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.4-10.el3" test_ref="oval:org.mitre.oval:tst:36608"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.4-10.el3" test_ref="oval:org.mitre.oval:tst:36928"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.9-8.el4.6" test_ref="oval:org.mitre.oval:tst:36978"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.9-8.el4.6" test_ref="oval:org.mitre.oval:tst:37295"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.9-8.el4.6" test_ref="oval:org.mitre.oval:tst:36877"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.9-8.el4.6" test_ref="oval:org.mitre.oval:tst:37292"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.2.1-20.el5_2" test_ref="oval:org.mitre.oval:tst:37321"/>
            <criterion comment="freetype-demos is earlier than 0:2.2.1-20.el5_2" test_ref="oval:org.mitre.oval:tst:37312"/>
            <criterion comment="freetype-devel is earlier than 0:2.2.1-20.el5_2" test_ref="oval:org.mitre.oval:tst:37160"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9318" version="5" class="vulnerability">
      <metadata>
        <title>The LDAP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet, a different vulnerability than CVE-2006-5740.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1562"/>
        <description>The LDAP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet, a different vulnerability than CVE-2006-5740.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:56.860-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:33.959-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:35.636-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9318 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:19.364-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:47.009-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37624"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37249"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37725"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37542"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37460"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9317" version="5" class="vulnerability">
      <metadata>
        <title>CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383"/>
        <description>CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:23.221-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:33.701-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:35.354-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9317 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:30.527-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:46.553-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xterm is earlier than 0:179-11.EL3" test_ref="oval:org.mitre.oval:tst:38121"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="xterm is earlier than 0:192-8.el4_7.2" test_ref="oval:org.mitre.oval:tst:37919"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="xterm is earlier than 0:215-5.el5_2.2" test_ref="oval:org.mitre.oval:tst:38031"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9315" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) 0.99.5 through 0.99.8 allow remote attackers to cause a denial of service (application crash) via a malformed packet to the (1) X.509sat or (2) Roofnet dissectors.  NOTE: Vector 2 might also lead to a hang.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1561"/>
        <description>Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) 0.99.5 through 0.99.8 allow remote attackers to cause a denial of service (application crash) via a malformed packet to the (1) X.509sat or (2) Roofnet dissectors.  NOTE: Vector 2 might also lead to a hang.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:05.445-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:33.407-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:35.007-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9315 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:40.386-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:46.007-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37624"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37249"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37725"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37542"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37460"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9314" version="5" class="vulnerability">
      <metadata>
        <title>libungif library before 4.1.0 allows attackers to corrupt memory and possibly execute arbitrary code via a crafted GIF file that leads to an out-of-bounds write.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350"/>
        <description>libungif library before 4.1.0 allows attackers to corrupt memory and possibly execute arbitrary code via a crafted GIF file that leads to an out-of-bounds write.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:49.373-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:33.079-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:34.681-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9314 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:09:04.344-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:45.468-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libungif is earlier than 0:4.1.0-15.el3.3" test_ref="oval:org.mitre.oval:tst:32066"/>
            <criterion comment="libungif-devel is earlier than 0:4.1.0-15.el3.3" test_ref="oval:org.mitre.oval:tst:31940"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libungif is earlier than 0:4.1.3-1.el4.2" test_ref="oval:org.mitre.oval:tst:31956"/>
            <criterion comment="libungif-progs is earlier than 0:4.1.3-1.el4.2" test_ref="oval:org.mitre.oval:tst:32398"/>
            <criterion comment="libungif-devel is earlier than 0:4.1.3-1.el4.2" test_ref="oval:org.mitre.oval:tst:31871"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="giflib-devel is earlier than 0:4.1.3-7.1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38143"/>
            <criterion comment="giflib-utils is earlier than 0:4.1.3-7.1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38622"/>
            <criterion comment="giflib is earlier than 0:4.1.3-7.1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38639"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9313" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to 0.10.12 allows remote attackers to cause a denial of service or corrupt memory via unknown vectors that cause Ethereal to free an invalid pointer.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3249"/>
        <description>Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to 0.10.12 allows remote attackers to cause a denial of service or corrupt memory via unknown vectors that cause Ethereal to free an invalid pointer.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:39.635-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:32.788-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:34.429-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9313 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:54.081-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:45.073-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32189"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32138"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32341"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32202"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9310" version="5" class="vulnerability">
      <metadata>
        <title>The php_handle_iff function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a -8 size value.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0524"/>
        <description>The php_handle_iff function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a -8 size value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:55.618-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:32.053-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:33.621-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9310 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:23.526-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:43.940-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31759"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:30948"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31858"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31704"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31679"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31505"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31819"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31329"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31673"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31737"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31787"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31830"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31383"/>
            <criterion comment="php is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31557"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31541"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31697"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31847"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31523"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31779"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31261"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31733"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9307" version="5" class="vulnerability">
      <metadata>
        <title>Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0815"/>
        <description>Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:36.138-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:31.629-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:33.218-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9307 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:12.811-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:43.362-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31545"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31539"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31661"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31482"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31112"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31605"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31330"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9306" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.14 does not properly implement certain dialogs associated with the (1) pkcs11.addmodule and (2) pkcs11.deletemodule operations, which makes it easier for remote attackers to trick a user into installing or removing an arbitrary PKCS11 module.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076"/>
        <description>Mozilla Firefox before 3.0.14 does not properly implement certain dialogs associated with the (1) pkcs11.addmodule and (2) pkcs11.deletemodule operations, which makes it easier for remote attackers to trick a user into installing or removing an arbitrary PKCS11 module.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:57.303-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:31.009-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:32.613-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9306 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:22.710-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:42.596-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39378"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39359"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39036"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39270"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39397"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39118"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:38444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39284"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:38466"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39389"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.5-1.el4_8" test_ref="oval:org.mitre.oval:tst:39088"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39081"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.5-1.el4_8" test_ref="oval:org.mitre.oval:tst:39351"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:38976"/>
            <criterion comment="firefox is earlier than 0:3.0.14-1.el4" test_ref="oval:org.mitre.oval:tst:39195"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39181"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39364"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39293"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39208"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39001"/>
            <criterion comment="nspr is earlier than 0:4.7.5-1.el5_4" test_ref="oval:org.mitre.oval:tst:39223"/>
            <criterion comment="firefox is earlier than 0:3.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39097"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.5-1.el5_4" test_ref="oval:org.mitre.oval:tst:39150"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39206"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9304" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464"/>
        <description>Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:38.770-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:30.506-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:32.106-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9304 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:07.945-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:41.885-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32940"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33113"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32275"/>
            <criterion comment="seamonkey is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33128"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32259"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32596"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33188"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32780"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33131"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33022"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.5.el4" test_ref="oval:org.mitre.oval:tst:33198"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33241"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33268"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.8-0.1.el4" test_ref="oval:org.mitre.oval:tst:33216"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32752"/>
            <criterion comment="seamonkey is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32536"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32857"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.5.el4" test_ref="oval:org.mitre.oval:tst:33185"/>
            <criterion comment="firefox is earlier than 0:1.5.0.8-0.1.el4" test_ref="oval:org.mitre.oval:tst:33140"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33088"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33118"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33171"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32856"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33214"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9303" version="5" class="vulnerability">
      <metadata>
        <title>The CUPS service, as used in SUSE Linux before 20070720 and other Linux distributions, allows remote attackers to cause a denial of service via unspecified vectors related to an incomplete fix for CVE-2007-0720 that introduced a different denial of service problem in SSL negotiation.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4045"/>
        <description>The CUPS service, as used in SUSE Linux before 20070720 and other Linux distributions, allows remote attackers to cause a denial of service via unspecified vectors related to an incomplete fix for CVE-2007-0720 that introduced a different denial of service problem in SSL negotiation.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:15.342-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:30.237-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:31.766-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9303 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:23.669-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:41.482-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 0:1.1.17-13.3.46" test_ref="oval:org.mitre.oval:tst:35491"/>
            <criterion comment="cups is earlier than 0:1.1.17-13.3.46" test_ref="oval:org.mitre.oval:tst:35533"/>
            <criterion comment="cups-libs is earlier than 0:1.1.17-13.3.46" test_ref="oval:org.mitre.oval:tst:35218"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 0:1.1.22-0.rc1.9.20.2.el4_5.2" test_ref="oval:org.mitre.oval:tst:34735"/>
            <criterion comment="cups is earlier than 0:1.1.22-0.rc1.9.20.2.el4_5.2" test_ref="oval:org.mitre.oval:tst:35537"/>
            <criterion comment="cups-libs is earlier than 0:1.1.22-0.rc1.9.20.2.el4_5.2" test_ref="oval:org.mitre.oval:tst:35415"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9291" version="5" class="vulnerability">
      <metadata>
        <title>The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-middle attacks using a valid, trusted X.509 certificate.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0155"/>
        <description>The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-middle attacks using a valid, trusted X.509 certificate.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:53.215-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:29.588-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:31.138-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9291 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:18.262-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:40.601-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="ipsec-tools is earlier than 0:0.2.5-0.4" test_ref="oval:org.mitre.oval:tst:30611"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9283" version="5" class="vulnerability">
      <metadata>
        <title>The AIM/ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) via a filename that contains invalid UTF-8 characters.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2102"/>
        <description>The AIM/ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) via a filename that contains invalid UTF-8 characters.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:40.438-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:29.369-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:30.872-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9283 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:07.306-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:40.255-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.3.1-0.el3.3" test_ref="oval:org.mitre.oval:tst:32063"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.3.1-0.el4.3" test_ref="oval:org.mitre.oval:tst:31738"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9280" version="5" class="vulnerability">
      <metadata>
        <title>Firefox 1.0.6 allows attackers to cause a denial of service (crash) via a Proxy Auto-Config (PAC) script that uses an eval statement. NOTE: it is not clear whether an untrusted party has any role in triggering this issue, so it might not be a vulnerability.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3089"/>
        <description>Firefox 1.0.6 allows attackers to cause a denial of service (crash) via a Proxy Auto-Config (PAC) script that uses an eval statement. NOTE: it is not clear whether an untrusted party has any role in triggering this issue, so it might not be a vulnerability.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:52.146-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:28.836-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:30.372-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9280 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:04.417-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:39.614-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32169"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:31729"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32242"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32151"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32014"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32144"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32068"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32248"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32293"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32244"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32012"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:31897"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32300"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32226"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32289"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32170"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32150"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32302"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32090"/>
            <criterion comment="firefox is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:32147"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32209"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32088"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:928" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 OpenSSL Kerberos Handshake Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>OpenSSL</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0112"/>
        <description>The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:59.729-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:09.352-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criterion comment="openssl version is less than 0.9.7a-33.4" negate="false" test_ref="oval:org.mitre.oval:tst:1543"/>
        <criterion comment="openssl-devel version is less than 0.9.7a-33.4" negate="false" test_ref="oval:org.mitre.oval:tst:1542"/>
        <criterion comment="openssl-perl version is less than 0.9.7a-33.4" negate="false" test_ref="oval:org.mitre.oval:tst:1541"/>
        <criterion comment="openssl096b version is less than 0.9.6b-16" negate="false" test_ref="oval:org.mitre.oval:tst:1540"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9279" version="5" class="vulnerability">
      <metadata>
        <title>PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1392"/>
        <description>PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:20:35.170-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:28.378-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:29.877-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9279 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:43.842-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:38.998-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31759"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:30948"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31858"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31704"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31679"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31505"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31819"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31329"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31673"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31737"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31787"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31830"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31383"/>
            <criterion comment="php is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31557"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31541"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31697"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31847"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31523"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31779"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31261"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31733"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9270" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the PCNFSD dissector in Wireshark 0.8.20 through 1.0.7 allows remote attackers to cause a denial of service (crash) via crafted PCNFSD packets.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829"/>
        <description>Unspecified vulnerability in the PCNFSD dissector in Wireshark 0.8.20 through 1.0.7 allows remote attackers to cause a denial of service (crash) via crafted PCNFSD packets.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:32.952-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:27.814-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:29.169-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9270 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:10.157-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:38.197-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.8-EL3.1" test_ref="oval:org.mitre.oval:tst:38258"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.8-EL3.1" test_ref="oval:org.mitre.oval:tst:38534"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.8-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:38635"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.8-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:38709"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.8-1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38670"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.8-1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38619"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9262" version="5" class="vulnerability">
      <metadata>
        <title>Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416"/>
        <description>Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:38.791-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:27.463-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:28.752-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9262 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:09.191-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:37.597-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.5.10-15" test_ref="oval:org.mitre.oval:tst:39096"/>
            <criterion comment="libxml2-python is earlier than 0:2.5.10-15" test_ref="oval:org.mitre.oval:tst:39077"/>
            <criterion comment="libxml-devel is earlier than 1:1.8.17-9.3" test_ref="oval:org.mitre.oval:tst:38476"/>
            <criterion comment="libxml is earlier than 1:1.8.17-9.3" test_ref="oval:org.mitre.oval:tst:38526"/>
            <criterion comment="libxml2 is earlier than 0:2.5.10-15" test_ref="oval:org.mitre.oval:tst:39158"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.16-12.7" test_ref="oval:org.mitre.oval:tst:39083"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.16-12.7" test_ref="oval:org.mitre.oval:tst:38887"/>
            <criterion comment="libxml2 is earlier than 0:2.6.16-12.7" test_ref="oval:org.mitre.oval:tst:39128"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.26-2.1.2.8" test_ref="oval:org.mitre.oval:tst:39183"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.26-2.1.2.8" test_ref="oval:org.mitre.oval:tst:38679"/>
            <criterion comment="libxml2 is earlier than 0:2.6.26-2.1.2.8" test_ref="oval:org.mitre.oval:tst:39178"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9260" version="5" class="vulnerability">
      <metadata>
        <title>Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0078"/>
        <description>The KDE screen saver in KDE before 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:55.973-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:27.246-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:28.516-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9260 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:23.701-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:37.274-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kdebase is earlier than 6:3.1.3-5.8" test_ref="oval:org.mitre.oval:tst:31113"/>
          <criterion comment="kdebase-devel is earlier than 6:3.1.3-5.8" test_ref="oval:org.mitre.oval:tst:31092"/>
          <criterion comment="kdelibs is earlier than 6:3.1.3-6.9" test_ref="oval:org.mitre.oval:tst:30244"/>
          <criterion comment="kdelibs-devel is earlier than 6:3.1.3-6.9" test_ref="oval:org.mitre.oval:tst:30826"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9257" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3120"/>
        <description>Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:51.725-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:26.983-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:28.282-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9257 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:34.879-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:36.892-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-11.1" test_ref="oval:org.mitre.oval:tst:31818"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-18.1" test_ref="oval:org.mitre.oval:tst:32386"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9254" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797"/>
        <description>Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:35.750-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:26.330-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:27.557-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9254 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:40.980-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:35.837-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36023"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36184"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36260"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36208"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36056"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36311"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36459"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36349"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35927"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36106"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36419"/>
            <criterion comment="ImageMagick is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36360"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36388"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:35921"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36133"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9248" version="5" class="vulnerability">
      <metadata>
        <title>The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891"/>
        <description>The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:48.147-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:25.344-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:26.272-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9248 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:39.622-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:34.829-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-75.ent" test_ref="oval:org.mitre.oval:tst:39033"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-75.ent" test_ref="oval:org.mitre.oval:tst:38392"/>
            <criterion comment="httpd is earlier than 0:2.0.46-75.ent" test_ref="oval:org.mitre.oval:tst:39071"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39448"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39501"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:38802"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39716"/>
            <criterion comment="httpd is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39551"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-manual is earlier than 0:2.2.3-22.el5_3.2" test_ref="oval:org.mitre.oval:tst:38846"/>
            <criterion comment="httpd-devel is earlier than 0:2.2.3-22.el5_3.2" test_ref="oval:org.mitre.oval:tst:38761"/>
            <criterion comment="mod_ssl is earlier than 0:2.2.3-22.el5_3.2" test_ref="oval:org.mitre.oval:tst:38385"/>
            <criterion comment="httpd is earlier than 0:2.2.3-22.el5_3.2" test_ref="oval:org.mitre.oval:tst:38816"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9241" version="5" class="vulnerability">
      <metadata>
        <title>nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0776"/>
        <description>nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:06.871-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:24.802-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:25.723-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9241 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:47.218-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:34.140-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38413"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38419"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38110"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38217"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37995"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37833"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38347"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38410"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37953"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38386"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:37842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-19.el4" test_ref="oval:org.mitre.oval:tst:38238"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38355"/>
            <criterion comment="firefox is earlier than 0:3.0.7-1.el4" test_ref="oval:org.mitre.oval:tst:38405"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38148"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38132"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38204"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38364"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38168"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:37685"/>
            <criterion comment="firefox is earlier than 0:3.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38372"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.21-1.el5" test_ref="oval:org.mitre.oval:tst:37944"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38365"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9240" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote attackers to use certain redirect sequences to spoof the security lock icon that makes a web page appear to be encrypted.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0761"/>
        <description>Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote attackers to use certain redirect sequences to spoof the security lock icon that makes a web page appear to be encrypted.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:24.383-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:24.322-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:25.415-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9240 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:58.477-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:33.617-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9231" version="5" class="vulnerability">
      <metadata>
        <title>The install function in Firefox 1.0.3 allows remote web sites on the browser's whitelist, such as update.mozilla.org or addon.mozilla.org, to execute arbitrary Javascript with chrome privileges, leading to arbitrary code execution on the system when combined with vulnerabilities such as CVE-2005-1476, as demonstrated using a javascript: URL as the package icon and a cross-site scripting (XSS) attack on a vulnerable whitelist site.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1477"/>
        <description>The install function in Firefox 1.0.3 allows remote web sites on the browser's whitelist, such as update.mozilla.org or addon.mozilla.org, to execute arbitrary Javascript with chrome privileges, leading to arbitrary code execution on the system when combined with vulnerabilities such as CVE-2005-1476, as demonstrated using a javascript: URL as the package icon and a cross-site scripting (XSS) attack on a vulnerable whitelist site.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:29.236-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:22.827-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:23.898-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9231 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:56.997-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:31.566-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31531"/>
            <criterion comment="mozilla is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31619"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31225"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31917"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31644"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31625"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31435"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31816"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31450"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.8-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31901"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:31590"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.5" test_ref="oval:org.mitre.oval:tst:31571"/>
            <criterion comment="mozilla is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:31860"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:31894"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:31245"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:31913"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.5" test_ref="oval:org.mitre.oval:tst:31692"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:31986"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:31365"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:31868"/>
            <criterion comment="firefox is earlier than 0:1.0.4-1.4.1" test_ref="oval:org.mitre.oval:tst:31311"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:30985"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.8-1.4.1" test_ref="oval:org.mitre.oval:tst:31723"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9209" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948"/>
        <description>Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:15.007-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:21.990-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:23.011-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9209 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:59.777-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:30.425-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="krb5-workstation is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36272"/>
          <criterion comment="krb5 is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36493"/>
          <criterion comment="krb5-libs is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36531"/>
          <criterion comment="krb5-server is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36304"/>
          <criterion comment="krb5-devel is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36522"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9204" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0003"/>
        <description>Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:05.187-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:21.715-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:22.711-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9204 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:06.392-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:30.060-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30346"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30006"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30702"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30513"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30280"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30056"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30508"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30654"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30307"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9196" version="5" class="vulnerability">
      <metadata>
        <title>The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0365"/>
        <description>The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:42.692-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:20.200-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:21.467-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9196 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:59.893-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:27.981-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.10.3-0.30E.1" test_ref="oval:org.mitre.oval:tst:29720"/>
          <criterion comment="ethereal is earlier than 0:0.10.3-0.30E.1" test_ref="oval:org.mitre.oval:tst:30448"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9187" version="5" class="vulnerability">
      <metadata>
        <title>Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0687"/>
        <description>Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:19.825-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:18.492-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:19.967-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9187 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:23.802-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:26.525-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30914"/>
          <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30029"/>
          <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30748"/>
          <criterion comment="XFree86-libs is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30779"/>
          <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30003"/>
          <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30783"/>
          <criterion comment="XFree86-twm is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30052"/>
          <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30925"/>
          <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:31001"/>
          <criterion comment="XFree86-doc is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30889"/>
          <criterion comment="openmotif21 is earlier than 0:2.1.30-9.RHEL3.4" test_ref="oval:org.mitre.oval:tst:30867"/>
          <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30841"/>
          <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30838"/>
          <criterion comment="openmotif is earlier than 0:2.2.3-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:31105"/>
          <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30875"/>
          <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30347"/>
          <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30599"/>
          <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30544"/>
          <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30612"/>
          <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30933"/>
          <criterion comment="XFree86-xdm is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30902"/>
          <criterion comment="XFree86-sdk is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30619"/>
          <criterion comment="XFree86 is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30899"/>
          <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30943"/>
          <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30747"/>
          <criterion comment="XFree86-xfs is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30145"/>
          <criterion comment="XFree86-tools is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30701"/>
          <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30805"/>
          <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30951"/>
          <criterion comment="openmotif-devel is earlier than 0:2.2.3-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:30744"/>
          <criterion comment="XFree86-xauth is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30843"/>
          <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30963"/>
          <criterion comment="XFree86-devel is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30677"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9185" version="5" class="vulnerability">
      <metadata>
        <title>The IRC protocol plugin in Gaim 1.2.0, and possibly earlier versions, allows (1) remote attackers to inject arbitrary Gaim markup via irc_msg_kick, irc_msg_mode, irc_msg_part, irc_msg_quit, (2) remote attackers to inject arbitrary Pango markup and pop up empty dialog boxes via irc_msg_invite, or (3) malicious IRC servers to cause a denial of service (application crash) by injecting certain Pango markup into irc_msg_badmode, irc_msg_banned, irc_msg_unknown, irc_msg_nochan functions.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0966"/>
        <description>The IRC protocol plugin in Gaim 1.2.0, and possibly earlier versions, allows (1) remote attackers to inject arbitrary Gaim markup via irc_msg_kick, irc_msg_mode, irc_msg_part, irc_msg_quit, (2) remote attackers to inject arbitrary Pango markup and pop up empty dialog boxes via irc_msg_invite, or (3) malicious IRC servers to cause a denial of service (application crash) by injecting certain Pango markup into irc_msg_badmode, irc_msg_banned, irc_msg_unknown, irc_msg_nochan functions.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:20.128-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:18.273-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:19.736-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9185 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:46.414-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:26.176-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.2.1-4.el3" test_ref="oval:org.mitre.oval:tst:31686"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.2.1-4.el4" test_ref="oval:org.mitre.oval:tst:31403"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9175" version="5" class="vulnerability">
      <metadata>
        <title>Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628"/>
        <description>Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:41.723-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:17.770-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:19.160-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9175 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:53.256-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:25.479-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32882"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32738"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32917"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32447"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9173" version="5" class="vulnerability">
      <metadata>
        <title>lib/vorbisfile.c in libvorbisfile in Xiph.Org libvorbis before 1.2.0 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted OGG file, aka trac Changeset 13217.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065"/>
        <description>lib/vorbisfile.c in libvorbisfile in Xiph.Org libvorbis before 1.2.0 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted OGG file, aka trac Changeset 13217.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:18:37.943-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:17.481-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:18.806-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9173 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:42.696-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:24.984-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.0-8.el3" test_ref="oval:org.mitre.oval:tst:35005"/>
            <criterion comment="libvorbis is earlier than 1:1.0-8.el3" test_ref="oval:org.mitre.oval:tst:35016"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.0-2.el4.5" test_ref="oval:org.mitre.oval:tst:34951"/>
            <criterion comment="libvorbis is earlier than 1:1.1.0-2.el4.5" test_ref="oval:org.mitre.oval:tst:34625"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.2-3.el5.0" test_ref="oval:org.mitre.oval:tst:35046"/>
            <criterion comment="libvorbis is earlier than 1:1.1.2-3.el5.0" test_ref="oval:org.mitre.oval:tst:34551"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:917" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 Mozilla Bypass Cookie Access Restrictions Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0594"/>
        <description>Mozilla allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Mozilla to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-04-08T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-05T12:00:00.000-04:00">INTERIM</status_change>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:42:04.843-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:09.181-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criterion comment="mozilla-nss version is less than 1.4.2-3.0.2" negate="false" test_ref="oval:org.mitre.oval:tst:1468"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9167" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inject arbitrary Javascript into other sites by (1) "using a modal alert to suspend an event handler while a new page is being loaded", (2) using eval(), and using certain variants involving (3) "new Script;" and (4) using window.__proto__ to extend eval, aka "cross-site JavaScript injection".</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741"/>
        <description>Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inject arbitrary Javascript into other sites by (1) "using a modal alert to suspend an event handler while a new page is being loaded", (2) using eval(), and using certain variants involving (3) "new Script;" and (4) using window.__proto__ to extend eval, aka "cross-site JavaScript injection".</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:36.424-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:16.930-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:18.309-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9167 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:22.574-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:24.370-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9163" version="5" class="vulnerability">
      <metadata>
        <title>The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0607"/>
        <description>The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:52.072-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:16.519-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:17.820-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9163 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:38.962-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:23.741-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="ipsec-tools is earlier than 0:0.2.5-0.5" test_ref="oval:org.mitre.oval:tst:30435"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9161" version="5" class="vulnerability">
      <metadata>
        <title>components/sessionstore/src/nsSessionStore.js in Mozilla Firefox before 3.0.6 does not block changes of INPUT elements to type="file" during tab restoration, which allows user-assisted remote attackers to read arbitrary files on a client machine via a crafted INPUT element.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0355"/>
        <description>components/sessionstore/src/nsSessionStore.js in Mozilla Firefox before 3.0.6 does not block changes of INPUT elements to type="file" during tab restoration, which allows user-assisted remote attackers to read arbitrary files on a client machine via a crafted INPUT element.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:54.410-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:15.899-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:17.212-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9161 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:38.636-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:22.776-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38173"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38181"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38221"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38323"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38337"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:37355"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38135"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38326"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38186"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38184"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-3.el4" test_ref="oval:org.mitre.oval:tst:38343"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-19.el4" test_ref="oval:org.mitre.oval:tst:38238"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38228"/>
            <criterion comment="firefox is earlier than 0:3.0.6-1.el4" test_ref="oval:org.mitre.oval:tst:37823"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-3.el4" test_ref="oval:org.mitre.oval:tst:37923"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:37943"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-3.el4" test_ref="oval:org.mitre.oval:tst:38172"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:37433"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38309"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38278"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:37933"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:37808"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:37350"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.21-1.el5" test_ref="oval:org.mitre.oval:tst:37944"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:37835"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:37556"/>
            <criterion comment="firefox is earlier than 0:3.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:38272"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:38040"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:37867"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9157" version="5" class="vulnerability">
      <metadata>
        <title>jslock.cpp in Mozilla Firefox 3.x before 3.0.2, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying the window.__proto__.__proto__ object in a way that causes a lock on a non-native object, which triggers an assertion failure related to the OBJ_IS_NATIVE function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014"/>
        <description>jslock.cpp in Mozilla Firefox 3.x before 3.0.2, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying the window.__proto__.__proto__ object in a way that causes a lock on a non-native object, which triggers an assertion failure related to the OBJ_IS_NATIVE function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:56.691-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:15.291-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:16.558-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9157 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:55.846-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:21.933-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-17.el4" test_ref="oval:org.mitre.oval:tst:37872"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.18-1.el5" test_ref="oval:org.mitre.oval:tst:38015"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9155" version="5" class="vulnerability">
      <metadata>
        <title>OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077"/>
        <description>OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:49.407-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:14.877-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:16.177-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9155 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:42.971-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:21.379-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.25" test_ref="oval:org.mitre.oval:tst:38011"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.25" test_ref="oval:org.mitre.oval:tst:37149"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-33.25" test_ref="oval:org.mitre.oval:tst:37990"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-16.49" test_ref="oval:org.mitre.oval:tst:38150"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-43.17.el4_7.2" test_ref="oval:org.mitre.oval:tst:37921"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-43.17.el4_7.2" test_ref="oval:org.mitre.oval:tst:38056"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-43.17.el4_7.2" test_ref="oval:org.mitre.oval:tst:37985"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-22.46.el4_7" test_ref="oval:org.mitre.oval:tst:37743"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl097a is earlier than 0:0.9.7a-9.el5_2.1" test_ref="oval:org.mitre.oval:tst:37259"/>
            <criterion comment="openssl-perl is earlier than 0:0.9.8b-10.el5_2.1" test_ref="oval:org.mitre.oval:tst:37599"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.8b-10.el5_2.1" test_ref="oval:org.mitre.oval:tst:37285"/>
            <criterion comment="openssl is earlier than 0:0.9.8b-10.el5_2.1" test_ref="oval:org.mitre.oval:tst:37906"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9151" version="5" class="vulnerability">
      <metadata>
        <title>The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778"/>
        <description>The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:53.508-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:13.905-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:15.151-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9151 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:07.473-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:20.247-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33391"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33688"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33675"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33724"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33510"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33409"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33467"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33658"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33649"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33381"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:32760"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33554"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33648"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:32765"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33712"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33705"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33379"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:33400"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:33759"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33678"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33695"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33697"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33244"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33645"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33461"/>
            <criterion comment="yelp is earlier than 0:2.16.0-14.0.1.el5" test_ref="oval:org.mitre.oval:tst:33761"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33744"/>
            <criterion comment="devhelp is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33415"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33616"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-1.el5" test_ref="oval:org.mitre.oval:tst:33493"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9145" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in OpenOffice.org (OOo) 2.0.4 and earlier, and possibly other versions before 2.1.0; and StarOffice 6 through 8; allow user-assisted remote attackers to execute arbitrary code via a crafted (a) WMF or (b) EMF file that triggers heap-based buffer overflows in (1) wmf/winwmf.cxx, during processing of META_ESCAPE records; and wmf/enhwmf.cxx, during processing of (2) EMR_POLYPOLYGON and (3) EMR_POLYPOLYGON16 records.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870"/>
        <description>Multiple integer overflows in OpenOffice.org (OOo) 2.0.4 and earlier, and possibly other versions before 2.1.0; and StarOffice 6 through 8; allow user-assisted remote attackers to execute arbitrary code via a crafted (a) WMF or (b) EMF file that triggers heap-based buffer overflows in (1) wmf/winwmf.cxx, during processing of META_ESCAPE records; and wmf/enhwmf.cxx, during processing of (2) EMR_POLYPOLYGON and (3) EMR_POLYPOLYGON16 records.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:06.177-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:13.619-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:14.770-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9145 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:52.306-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:19.805-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-35.2.0.EL3" test_ref="oval:org.mitre.oval:tst:33108"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-35.2.0.EL3" test_ref="oval:org.mitre.oval:tst:32394"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-35.2.0.EL3" test_ref="oval:org.mitre.oval:tst:33055"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.5-6.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33223"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.5-6.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33235"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.5-6.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33295"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.5-6.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32781"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9142" version="5" class="vulnerability">
      <metadata>
        <title>The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698"/>
        <description>The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:38.799-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:12.949-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:14.154-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9142 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:25.612-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:18.955-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:39011"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38739"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38992"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38800"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:39114"/>
            <criterion comment="kernel is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:39044"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:39194"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38832"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38859"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39007"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38642"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38673"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39035"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38510"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38920"/>
            <criterion comment="kernel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39188"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39065"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39182"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39164"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38624"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39175"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38848"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39017"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38949"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39066"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38199"/>
            <criterion comment="kernel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39057"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39072"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38868"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39155"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38973"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38459"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9140" version="5" class="vulnerability">
      <metadata>
        <title>Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0084"/>
        <description>Buffer overflow in the X11 dissector in Ethereal 0.8.10 through 0.10.8 allows remote attackers to execute arbitrary code via a crafted packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:16.367-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:12.678-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:13.850-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9140 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:00.002-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:18.558-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31265"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31218"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31097"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31103"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:914" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 S/MIME Protocol Denial of Service Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0564"/>
        <description>Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-04-08T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-05T12:00:00.000-04:00">INTERIM</status_change>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:51.518-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:09.016-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criterion comment="mozilla-nss version is less than 1.4.2-3.0.2" negate="false" test_ref="oval:org.mitre.oval:tst:1468"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9124" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c.  NOTE: item 4 was originally identified by CVE-2006-2493.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861"/>
        <description>Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c.  NOTE: item 4 was originally identified by CVE-2006-2493.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:04.611-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:12.380-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:13.550-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9124 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:25.873-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:18.121-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:37450"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:38245"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:38284"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:38008"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38414"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38395"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38234"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38442"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9118" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the SMB dissector in Ethereal 0.9.0 through 0.10.11 allows remote attackers to cause a buffer overflow or a denial of service (memory consumption) via unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2365"/>
        <description>Unknown vulnerability in the SMB dissector in Ethereal 0.9.0 through 0.10.11 allows remote attackers to cause a buffer overflow or a denial of service (memory consumption) via unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:13:27.474-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:12.134-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:13.297-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9118 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:09.449-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:17.669-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.12-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31966"/>
            <criterion comment="ethereal is earlier than 0:0.10.12-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32076"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.12-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32122"/>
            <criterion comment="ethereal is earlier than 0:0.10.12-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32035"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9106" version="5" class="vulnerability">
      <metadata>
        <title>The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0941"/>
        <description>The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:19:38.519-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:10.851-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:12.079-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9106 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:31.734-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:15.991-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-24.2.0.EL3" test_ref="oval:org.mitre.oval:tst:31752"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-24.2.0.EL3" test_ref="oval:org.mitre.oval:tst:31453"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-24.2.0.EL3" test_ref="oval:org.mitre.oval:tst:31739"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-24.6.0.EL4" test_ref="oval:org.mitre.oval:tst:31617"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-24.6.0.EL4" test_ref="oval:org.mitre.oval:tst:31671"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.2-24.6.0.EL4" test_ref="oval:org.mitre.oval:tst:31138"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-24.6.0.EL4" test_ref="oval:org.mitre.oval:tst:31736"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9105" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 1.8.0.13 and 1.8.1.x before 1.8.1.5 does not perform a security zone check when processing a wyciwyg URI, which allows remote attackers to obtain sensitive information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656"/>
        <description>Mozilla Firefox before 1.8.0.13 and 1.8.1.x before 1.8.1.5 does not perform a security zone check when processing a wyciwyg URI, which allows remote attackers to obtain sensitive information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:45.122-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:10.352-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:11.534-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9105 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:58.154-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:15.313-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:33986"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34827"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34839"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34762"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34814"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34694"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34925"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34723"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34747"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34968"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34971"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34868"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34492"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34775"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.3.el4" test_ref="oval:org.mitre.oval:tst:34828"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34981"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34335"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34957"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34608"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34810"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34667"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9071" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704"/>
        <description>Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:13.252-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:08.389-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:09.527-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9071 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:25.607-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:12.848-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="elfutils-libelf-devel is earlier than 0:0.94.1-2" test_ref="oval:org.mitre.oval:tst:32457"/>
            <criterion comment="binutils is earlier than 0:2.14.90.0.4-39" test_ref="oval:org.mitre.oval:tst:31731"/>
            <criterion comment="elfutils-libelf is earlier than 0:0.94.1-2" test_ref="oval:org.mitre.oval:tst:32656"/>
            <criterion comment="elfutils-devel is earlier than 0:0.94.1-2" test_ref="oval:org.mitre.oval:tst:32533"/>
            <criterion comment="elfutils is earlier than 0:0.94.1-2" test_ref="oval:org.mitre.oval:tst:32396"/>
            <criterion comment="gdb is earlier than 0:6.3.0.0-1.62" test_ref="oval:org.mitre.oval:tst:29887"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="elfutils-libelf-devel is earlier than 0:0.97.1-3" test_ref="oval:org.mitre.oval:tst:32684"/>
            <criterion comment="binutils is earlier than 0:2.15.92.0.2-15" test_ref="oval:org.mitre.oval:tst:31192"/>
            <criterion comment="elfutils-libelf is earlier than 0:0.97.1-3" test_ref="oval:org.mitre.oval:tst:31848"/>
            <criterion comment="elfutils-devel is earlier than 0:0.97.1-3" test_ref="oval:org.mitre.oval:tst:32660"/>
            <criterion comment="elfutils is earlier than 0:0.97.1-3" test_ref="oval:org.mitre.oval:tst:32629"/>
            <criterion comment="gdb is earlier than 0:6.3.0.0-1.63" test_ref="oval:org.mitre.oval:tst:32136"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9067" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the custom tag support for the TIFF library (libtiff) before 3.8.2 allows remote attackers to cause a denial of service (instability or crash) and execute arbitrary code via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465"/>
        <description>Unspecified vulnerability in the custom tag support for the TIFF library (libtiff) before 3.8.2 allows remote attackers to cause a denial of service (instability or crash) and execute arbitrary code via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:00.520-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:08.120-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:09.249-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9067 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:13.834-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:12.426-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:32819"/>
            <criterion comment="libtiff is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32069"/>
            <criterion comment="kdegraphics is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:33012"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32843"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32922"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32413"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9063" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024"/>
        <description>Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:08.912-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:07.409-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:08.374-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9063 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:29:58.999-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:11.578-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-17.el4" test_ref="oval:org.mitre.oval:tst:37872"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.18-1.el5" test_ref="oval:org.mitre.oval:tst:38015"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9058" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in CVS 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7, when using the pserver mechanism allows remote attackers to execute arbitrary code via Entry lines.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0396"/>
        <description>Heap-based buffer overflow in CVS 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7, when using the pserver mechanism allows remote attackers to execute arbitrary code via Entry lines.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:17:05.504-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:07.219-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:08.179-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9058 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:47.705-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:11.312-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="cvs is earlier than 0:1.11.2-22" test_ref="oval:org.mitre.oval:tst:30644"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:905" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 Ethereal Denial of Service via 0-Length Presentation Protocol Selector</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0367"/>
        <description>Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-04-08T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:32.816-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:08.565-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criteria operator="OR" comment="Vulnerable Config">
            <criterion comment="ethereal version is less than 0.10.3-0.30E.1" negate="false" test_ref="oval:org.mitre.oval:tst:1505"/>
            <criterion comment="ethereal-gnome version is less than 0.10.3-0.30E.1" negate="false" test_ref="oval:org.mitre.oval:tst:1504"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="Vulnerable Config">
            <criteria operator="OR" comment="/usr/bin/ethereal is executable">
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1529"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1528"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1527"/>
            </criteria>
            <criteria operator="OR" comment="/usr/sbin/ethereal is executable">
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1526"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1525"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1524"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/tethereal is executable">
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1523"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1522"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1521"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9040" version="5" class="vulnerability">
      <metadata>
        <title>The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0135"/>
        <description>The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:09:47.652-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:05.902-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:06.894-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9040 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:14:07.964-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:09.628-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31148"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31473"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31178"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31282"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31565"/>
            <criterion comment="kernel is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31562"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31582"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:30730"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31534"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31545"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31539"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31661"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31482"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31112"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31605"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31330"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9020" version="5" class="vulnerability">
      <metadata>
        <title>The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145"/>
        <description>The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:47.309-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:05.610-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:06.232-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9020 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:14.859-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:09.149-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37624"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37249"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37725"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37542"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37460"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9005" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer.  NOTE: some of these details are obtained from third party information.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373"/>
        <description>Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer.  NOTE: some of these details are obtained from third party information.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:52.754-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:05.140-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:05.736-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9005 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:29.401-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:08.466-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="pidgin is earlier than 0:1.5.1-3.el3" test_ref="oval:org.mitre.oval:tst:38766"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="finch-devel is earlier than 0:2.5.5-2.el4" test_ref="oval:org.mitre.oval:tst:38580"/>
            <criterion comment="libpurple is earlier than 0:2.5.5-2.el4" test_ref="oval:org.mitre.oval:tst:38729"/>
            <criterion comment="libpurple-perl is earlier than 0:2.5.5-2.el4" test_ref="oval:org.mitre.oval:tst:38659"/>
            <criterion comment="libpurple-tcl is earlier than 0:2.5.5-2.el4" test_ref="oval:org.mitre.oval:tst:38675"/>
            <criterion comment="pidgin-devel is earlier than 0:2.5.5-2.el4" test_ref="oval:org.mitre.oval:tst:38361"/>
            <criterion comment="libpurple-devel is earlier than 0:2.5.5-2.el4" test_ref="oval:org.mitre.oval:tst:38431"/>
            <criterion comment="finch is earlier than 0:2.5.5-2.el4" test_ref="oval:org.mitre.oval:tst:38593"/>
            <criterion comment="pidgin-perl is earlier than 0:2.5.5-2.el4" test_ref="oval:org.mitre.oval:tst:38640"/>
            <criterion comment="pidgin is earlier than 0:2.5.5-2.el4" test_ref="oval:org.mitre.oval:tst:38775"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="finch-devel is earlier than 0:2.5.5-3.el5" test_ref="oval:org.mitre.oval:tst:38564"/>
            <criterion comment="libpurple is earlier than 0:2.5.5-3.el5" test_ref="oval:org.mitre.oval:tst:38579"/>
            <criterion comment="libpurple-perl is earlier than 0:2.5.5-3.el5" test_ref="oval:org.mitre.oval:tst:38686"/>
            <criterion comment="libpurple-tcl is earlier than 0:2.5.5-3.el5" test_ref="oval:org.mitre.oval:tst:38687"/>
            <criterion comment="pidgin-devel is earlier than 0:2.5.5-3.el5" test_ref="oval:org.mitre.oval:tst:38223"/>
            <criterion comment="libpurple-devel is earlier than 0:2.5.5-3.el5" test_ref="oval:org.mitre.oval:tst:38606"/>
            <criterion comment="finch is earlier than 0:2.5.5-3.el5" test_ref="oval:org.mitre.oval:tst:38749"/>
            <criterion comment="pidgin-perl is earlier than 0:2.5.5-3.el5" test_ref="oval:org.mitre.oval:tst:38576"/>
            <criterion comment="pidgin is earlier than 0:2.5.5-3.el5" test_ref="oval:org.mitre.oval:tst:38730"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:9004" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484"/>
        <description>Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:38.944-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:04.556-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:05.178-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:9004 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:15.824-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:07.650-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32928"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32870"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32829"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32485"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32258"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32491"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32860"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32175"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32788"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:33059"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32876"/>
            <criterion comment="php is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32754"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:33047"/>
            <criterion comment="gd-progs is earlier than 0:2.0.28-5.4E.el4_6.1" test_ref="oval:org.mitre.oval:tst:35731"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:33052"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32964"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32700"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32272"/>
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32985"/>
            <criterion comment="gd-devel is earlier than 0:2.0.28-5.4E.el4_6.1" test_ref="oval:org.mitre.oval:tst:36408"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32808"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32962"/>
            <criterion comment="gd is earlier than 0:2.0.28-5.4E.el4_6.1" test_ref="oval:org.mitre.oval:tst:36386"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32483"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gd is earlier than 0:2.0.33-9.4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36297"/>
            <criterion comment="gd-devel is earlier than 0:2.0.33-9.4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36448"/>
            <criterion comment="gd-progs is earlier than 0:2.0.33-9.4.el5_1.1" test_ref="oval:org.mitre.oval:tst:35759"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8996" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143"/>
        <description>Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:06.152-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:04.157-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:04.710-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8996 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:15.932-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:07.005-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38704"/>
            <criterion comment="tkinter is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38695"/>
            <criterion comment="python-tools is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38872"/>
            <criterion comment="python is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38617"/>
            <criterion comment="python-docs is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:37965"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38916"/>
            <criterion comment="tkinter is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38703"/>
            <criterion comment="python-tools is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38787"/>
            <criterion comment="python is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38939"/>
            <criterion comment="python-docs is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38081"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38889"/>
            <criterion comment="tkinter is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38958"/>
            <criterion comment="python-tools is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38827"/>
            <criterion comment="python is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38282"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8992" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions.  NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885).  NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906"/>
        <description>Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions.  NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885).  NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:16:30.268-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:02.968-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:03.653-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8992 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:43.245-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:05.722-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33459"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33371"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33748"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33090"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33419"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33665"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33475"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33282"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33636"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33548"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33156"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33407"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33562"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33500"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33725"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33105"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33501"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33691"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33662"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33087"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33640"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:32784"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33240"/>
            <criterion comment="php-common is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33527"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33617"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33561"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33385"/>
            <criterion comment="php is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33615"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33526"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33747"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33735"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33403"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33686"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33502"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33666"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33508"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33652"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33676"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33784"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33706"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8978" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361"/>
        <description>Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:45.717-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:01.661-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:02.694-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8978 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:13.119-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:04.559-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36946"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36579"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36881"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36895"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36542"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36866"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36934"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36951"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36973"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36756"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36632"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36469"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36368"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36851"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36740"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36985"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36805"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36754"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36734"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36918"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36499"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36402"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36931"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36752"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36976"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36867"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36115"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36794"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36943"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36905"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36908"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36685"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36662"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36309"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36944"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36641"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36607"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36651"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36977"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36939"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36385"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36979"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36933"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36742"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36873"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36932"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:35995"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-server-randr-source is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:37018"/>
            <criterion comment="xorg-x11-server-Xnest is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36836"/>
            <criterion comment="xorg-x11-server-Xvfb is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36063"/>
            <criterion comment="xorg-x11-server-Xdmx is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36029"/>
            <criterion comment="xorg-x11-server is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36986"/>
            <criterion comment="xorg-x11-server-sdk is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36380"/>
            <criterion comment="xorg-x11-server-Xephyr is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36055"/>
            <criterion comment="xorg-x11-server-Xorg is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36359"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8968" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0238"/>
        <description>Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:45.986-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:11:00.206-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:01.225-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8968 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:51.318-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:02.630-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-38.2.0.EL3" test_ref="oval:org.mitre.oval:tst:33440"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-38.2.0.EL3" test_ref="oval:org.mitre.oval:tst:33125"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-38.2.0.EL3" test_ref="oval:org.mitre.oval:tst:33421"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.5-10.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33334"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.5-10.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33202"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.5-10.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33265"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.5-10.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33436"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-langpack-sk_SK is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33388"/>
            <criterion comment="openoffice.org-langpack-zu_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33424"/>
            <criterion comment="openoffice.org-langpack-pa_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33485"/>
            <criterion comment="openoffice.org-langpack-hi_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33323"/>
            <criterion comment="openoffice.org-langpack-et_EE is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33367"/>
            <criterion comment="openoffice.org-langpack-kn_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33452"/>
            <criterion comment="openoffice.org is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33446"/>
            <criterion comment="openoffice.org-langpack-zh_TW is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33301"/>
            <criterion comment="openoffice.org-writer is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33679"/>
            <criterion comment="openoffice.org-langpack-ve_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33157"/>
            <criterion comment="openoffice.org-langpack-ga_IE is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33463"/>
            <criterion comment="openoffice.org-langpack-ta_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33142"/>
            <criterion comment="openoffice.org-langpack-ko_KR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33606"/>
            <criterion comment="openoffice.org-langpack-or_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33009"/>
            <criterion comment="openoffice.org-langpack-da_DK is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33302"/>
            <criterion comment="openoffice.org-langpack-sr_CS is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33387"/>
            <criterion comment="openoffice.org-langpack-pl_PL is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33013"/>
            <criterion comment="openoffice.org-langpack-fr is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33611"/>
            <criterion comment="openoffice.org-langpack-ts_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33638"/>
            <criterion comment="openoffice.org-javafilter is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33048"/>
            <criterion comment="openoffice.org-langpack-as_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33513"/>
            <criterion comment="openoffice.org-testtools is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33756"/>
            <criterion comment="openoffice.org-langpack-hr_HR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33355"/>
            <criterion comment="openoffice.org-langpack-de is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33147"/>
            <criterion comment="openoffice.org-emailmerge is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33448"/>
            <criterion comment="openoffice.org-xsltfilter is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33749"/>
            <criterion comment="openoffice.org-langpack-tn_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33529"/>
            <criterion comment="openoffice.org-langpack-te_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33254"/>
            <criterion comment="openoffice.org-langpack-sv is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33659"/>
            <criterion comment="openoffice.org-base is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33060"/>
            <criterion comment="openoffice.org-langpack-ca_ES is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33039"/>
            <criterion comment="openoffice.org-langpack-nr_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33271"/>
            <criterion comment="openoffice.org-core is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33389"/>
            <criterion comment="openoffice.org-langpack-nl is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33476"/>
            <criterion comment="openoffice.org-langpack-ur is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33477"/>
            <criterion comment="openoffice.org-langpack-nn_NO is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33051"/>
            <criterion comment="openoffice.org-langpack-ar is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33313"/>
            <criterion comment="openoffice.org-langpack-ja_JP is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33511"/>
            <criterion comment="openoffice.org-langpack-gu_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:32740"/>
            <criterion comment="openoffice.org-langpack-tr_TR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33552"/>
            <criterion comment="openoffice.org-langpack-eu_ES is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33490"/>
            <criterion comment="openoffice.org-langpack-fi_FI is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33514"/>
            <criterion comment="openoffice.org-graphicfilter is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33365"/>
            <criterion comment="openoffice.org-pyuno is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33599"/>
            <criterion comment="openoffice.org-langpack-ml_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33533"/>
            <criterion comment="openoffice.org-langpack-gl_ES is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33023"/>
            <criterion comment="openoffice.org-langpack-zh_CN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33160"/>
            <criterion comment="openoffice.org-langpack-xh_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33553"/>
            <criterion comment="openoffice.org-langpack-it is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33401"/>
            <criterion comment="openoffice.org-langpack-es is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33480"/>
            <criterion comment="openoffice.org-langpack-nb_NO is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33168"/>
            <criterion comment="openoffice.org-langpack-sl_SI is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33643"/>
            <criterion comment="openoffice.org-draw is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33451"/>
            <criterion comment="openoffice.org-langpack-nso_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33201"/>
            <criterion comment="openoffice.org-langpack-ms_MY is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33486"/>
            <criterion comment="openoffice.org-langpack-el_GR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:32762"/>
            <criterion comment="openoffice.org-langpack-hu_HU is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33450"/>
            <criterion comment="openoffice.org-langpack-ss_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33579"/>
            <criterion comment="openoffice.org-langpack-bn is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33544"/>
            <criterion comment="openoffice.org-langpack-he_IL is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33358"/>
            <criterion comment="openoffice.org-langpack-pt_PT is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33604"/>
            <criterion comment="openoffice.org-langpack-lt_LT is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33212"/>
            <criterion comment="openoffice.org-langpack-af_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33377"/>
            <criterion comment="openoffice.org-langpack-bg_BG is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33364"/>
            <criterion comment="openoffice.org-calc is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33111"/>
            <criterion comment="openoffice.org-langpack-cs_CZ is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33324"/>
            <criterion comment="openoffice.org-langpack-cy_GB is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33471"/>
            <criterion comment="openoffice.org-langpack-mr_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33420"/>
            <criterion comment="openoffice.org-langpack-th_TH is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33670"/>
            <criterion comment="openoffice.org-langpack-pt_BR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:32682"/>
            <criterion comment="openoffice.org-langpack-ru is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33543"/>
            <criterion comment="openoffice.org-math is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33517"/>
            <criterion comment="openoffice.org-impress is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33393"/>
            <criterion comment="openoffice.org-langpack-st_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33484"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8966" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379"/>
        <description>Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:16.195-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:59.257-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:12:00.268-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8966 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:48.747-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:18:00.918-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36946"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36579"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36881"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36895"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36542"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36866"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36934"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36951"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36973"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36756"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36632"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36469"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36368"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36851"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36740"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36985"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36805"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36754"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36734"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36918"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36499"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36402"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36931"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36752"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36976"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36867"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36115"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36794"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36943"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-128.EL" test_ref="oval:org.mitre.oval:tst:36905"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36908"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36685"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36662"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36309"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36944"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36641"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36607"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36651"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36977"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36939"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36385"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36979"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36933"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36742"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36873"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36932"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:35995"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.33.0.4" test_ref="oval:org.mitre.oval:tst:36941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-server-randr-source is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:37018"/>
            <criterion comment="xorg-x11-server-Xnest is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36836"/>
            <criterion comment="xorg-x11-server-Xvfb is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36063"/>
            <criterion comment="xorg-x11-server-Xdmx is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36029"/>
            <criterion comment="xorg-x11-server is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36986"/>
            <criterion comment="xorg-x11-server-sdk is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36380"/>
            <criterion comment="xorg-x11-server-Xephyr is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36055"/>
            <criterion comment="xorg-x11-server-Xorg is earlier than 0:1.1.1-48.41.el5_2.1" test_ref="oval:org.mitre.oval:tst:36359"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8916" version="5" class="vulnerability">
      <metadata>
        <title>The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063"/>
        <description>The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:11:11.357-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:57.885-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:58.850-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8916 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:45.662-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:59.083-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36272"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36493"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36531"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36304"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-68" test_ref="oval:org.mitre.oval:tst:36522"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36541"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36418"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36371"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36482"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-54.el4_6.1" test_ref="oval:org.mitre.oval:tst:36207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36318"/>
            <criterion comment="krb5 is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36285"/>
            <criterion comment="krb5-libs is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36069"/>
            <criterion comment="krb5-server is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36233"/>
            <criterion comment="krb5-devel is earlier than 0:1.6.1-17.el5_1.1" test_ref="oval:org.mitre.oval:tst:36199"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:891" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 Ethereal Denial of Service via Malformed RADIUS Packet</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0365"/>
        <description>The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-04-08T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:20.992-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:07.785-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criteria operator="OR" comment="Vulnerable Config">
            <criterion comment="ethereal version is less than 0.10.3-0.30E.1" negate="false" test_ref="oval:org.mitre.oval:tst:1505"/>
            <criterion comment="ethereal-gnome version is less than 0.10.3-0.30E.1" negate="false" test_ref="oval:org.mitre.oval:tst:1504"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="Vulnerable Config">
            <criteria operator="OR" comment="/usr/bin/ethereal is executable">
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1529"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1528"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1527"/>
            </criteria>
            <criteria operator="OR" comment="/usr/sbin/ethereal is executable">
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1526"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1525"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1524"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/tethereal is executable">
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1523"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1522"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1521"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8896" version="5" class="vulnerability">
      <metadata>
        <title>Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0803"/>
        <description>Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:03.181-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:57.571-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:58.425-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8896 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:34.296-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:58.649-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="tetex-latex is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31559"/>
          <criterion comment="kdegraphics-devel is earlier than 7:3.1.3-3.7" test_ref="oval:org.mitre.oval:tst:30890"/>
          <criterion comment="libtiff is earlier than 0:3.5.7-20.1" test_ref="oval:org.mitre.oval:tst:31042"/>
          <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31693"/>
          <criterion comment="kdegraphics is earlier than 7:3.1.3-3.7" test_ref="oval:org.mitre.oval:tst:31096"/>
          <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31615"/>
          <criterion comment="tetex is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31603"/>
          <criterion comment="libtiff-devel is earlier than 0:3.5.7-20.1" test_ref="oval:org.mitre.oval:tst:31022"/>
          <criterion comment="tetex-afm is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31685"/>
          <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31747"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8888" version="5" class="vulnerability">
      <metadata>
        <title>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563"/>
        <description>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:34.973-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:56.979-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:57.837-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8888 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:44.345-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:57.864-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39570"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39466"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39720"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39691"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39583"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39280"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39727"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39575"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39724"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.6-1.el4_8" test_ref="oval:org.mitre.oval:tst:39525"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39481"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.6-1.el4_8" test_ref="oval:org.mitre.oval:tst:38755"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39675"/>
            <criterion comment="firefox is earlier than 0:3.0.15-3.el4" test_ref="oval:org.mitre.oval:tst:39710"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39683"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39031"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39547"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39753"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39602"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39541"/>
            <criterion comment="nspr is earlier than 0:4.7.6-1.el5_4" test_ref="oval:org.mitre.oval:tst:39168"/>
            <criterion comment="firefox is earlier than 0:3.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39294"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.6-1.el5_4" test_ref="oval:org.mitre.oval:tst:39579"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39636"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8880" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped low surrogate characters that are ignored by the HTML parser, as demonstrated by a "javascript" sequence, aka "HTML escaped low surrogates bug."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4066"/>
        <description>Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped low surrogate characters that are ignored by the HTML parser, as demonstrated by a "jav&amp;#56325ascript" sequence, aka "HTML escaped low surrogates bug."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:22.936-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:56.240-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:57.063-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8880 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:24.188-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:56.690-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-16.el4" test_ref="oval:org.mitre.oval:tst:37634"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="thunderbird is earlier than 0:2.0.0.17-1.el5" test_ref="oval:org.mitre.oval:tst:37230"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8872" version="5" class="vulnerability">
      <metadata>
        <title>The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308"/>
        <description>The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:46.912-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:55.587-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:56.417-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8872 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:02.975-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:55.841-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35660"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35620"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35663"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35627"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35653"/>
            <criterion comment="kernel is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35769"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35035"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35699"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:34809"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34864"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35017"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35145"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34442"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35258"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35254"/>
            <criterion comment="kernel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35373"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34480"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34911"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34923"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35327"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35330"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35339"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35337"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35227"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35043"/>
            <criterion comment="kernel is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35276"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:34448"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35366"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35208"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35326"/>
            <criterion comment="kernel-debuginfo-common is earlier than 0:2.6.18-8.1.15.el5" test_ref="oval:org.mitre.oval:tst:35345"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:887" version="2" class="vulnerability">
      <metadata>
        <title>Multiple BO Vulnerabilities in Red Hat Enterprise 3 Ethereal</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0176"/>
        <description>Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-04-08T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:37.108-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:07.514-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criteria operator="OR" comment="Vulnerable Config">
            <criterion comment="ethereal version is less than 0.10.3-0.30E.1" negate="false" test_ref="oval:org.mitre.oval:tst:1505"/>
            <criterion comment="ethereal-gnome version is less than 0.10.3-0.30E.1" negate="false" test_ref="oval:org.mitre.oval:tst:1504"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="Vulnerable Config">
            <criteria operator="OR" comment="/usr/bin/ethereal is executable">
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1529"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1528"/>
              <criterion comment="/usr/bin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1527"/>
            </criteria>
            <criteria operator="OR" comment="/usr/sbin/ethereal is executable">
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1526"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1525"/>
              <criterion comment="/usr/sbin/ethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1524"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/tethereal is executable">
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1523"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1522"/>
              <criterion comment="/usr/bin/tethereal is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1521"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8843" version="5" class="vulnerability">
      <metadata>
        <title>Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0817"/>
        <description>Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:45.674-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:54.909-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:55.731-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8843 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:16.851-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:54.870-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="imlib is earlier than 1:1.9.13-13.3" test_ref="oval:org.mitre.oval:tst:30862"/>
          <criterion comment="imlib-devel is earlier than 1:1.9.13-13.3" test_ref="oval:org.mitre.oval:tst:30970"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8833" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses.  NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335"/>
        <description>Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses.  NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:15:01.150-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:54.466-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:55.259-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8833 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:30.953-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:54.184-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.2.0-3.el3.2" test_ref="oval:org.mitre.oval:tst:31634"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.2.5-6.el4.2" test_ref="oval:org.mitre.oval:tst:32163"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8778" version="5" class="vulnerability">
      <metadata>
        <title>The shmctl function in Linux 2.6.9 and earlier allows local users to unlock the memory of other processes, which could cause sensitive memory to be swapped to disk, which could allow it to be read by other users once it has been released.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0176"/>
        <description>The shmctl function in Linux 2.6.9 and earlier allows local users to unlock the memory of other processes, which could cause sensitive memory to be swapped to disk, which could allow it to be read by other users once it has been released.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:14:29.507-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:54.071-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:54.809-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8778 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:58.932-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:53.609-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31870"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31657"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31642"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31984"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31213"/>
            <criterion comment="kernel is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31839"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31941"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31760"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31960"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30633"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31009"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30369"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30421"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30594"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30616"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8768" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722"/>
        <description>Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:12:44.986-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:53.535-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:54.458-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8768 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:09.571-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:53.059-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 0:1.1.17-13.3.53" test_ref="oval:org.mitre.oval:tst:36975"/>
            <criterion comment="cups is earlier than 0:1.1.17-13.3.53" test_ref="oval:org.mitre.oval:tst:36705"/>
            <criterion comment="cups-libs is earlier than 0:1.1.17-13.3.53" test_ref="oval:org.mitre.oval:tst:36751"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 0:1.1.22-0.rc1.9.20.2.el4_6.8" test_ref="oval:org.mitre.oval:tst:36818"/>
            <criterion comment="cups is earlier than 0:1.1.22-0.rc1.9.20.2.el4_6.8" test_ref="oval:org.mitre.oval:tst:36974"/>
            <criterion comment="cups-libs is earlier than 0:1.1.22-0.rc1.9.20.2.el4_6.8" test_ref="oval:org.mitre.oval:tst:36816"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-lpd is earlier than 0:1.2.4-11.18.el5_2.1" test_ref="oval:org.mitre.oval:tst:36736"/>
            <criterion comment="cups-devel is earlier than 0:1.2.4-11.18.el5_2.1" test_ref="oval:org.mitre.oval:tst:36909"/>
            <criterion comment="cups is earlier than 0:1.2.4-11.18.el5_2.1" test_ref="oval:org.mitre.oval:tst:36512"/>
            <criterion comment="cups-libs is earlier than 0:1.2.4-11.18.el5_2.1" test_ref="oval:org.mitre.oval:tst:36915"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:876" version="4" class="vulnerability">
      <metadata>
        <title>Apache 2 Denial of Service due to Memory Leak in mod_ssl</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>httpd</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0113"/>
        <description>Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-26T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:31.325-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:06.035-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.470-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T21:00:00.400-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:44.890-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="mod_ssl version is less than 2.0.46-32.ent" negate="false" test_ref="oval:org.mitre.oval:tst:1534"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="httpd is listening to the network" negate="false" test_ref="oval:org.mitre.oval:tst:1611"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:8757" version="5" class="vulnerability">
      <metadata>
        <title>GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779"/>
        <description>GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:10:03.340-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:51.570-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:52.447-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:8757 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:29.311-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:17:51.395-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33391"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33688"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33675"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33724"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33510"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33409"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33467"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33658"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33649"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33381"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:32760"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33554"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33648"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:32765"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33712"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33705"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33379"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:33400"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:33759"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33678"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33695"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33697"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33244"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33645"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33461"/>
            <criterion comment="yelp is earlier than 0:2.16.0-14.0.1.el5" test_ref="oval:org.mitre.oval:tst:33761"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33744"/>
            <criterion comment="devhelp is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33415"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33616"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-1.el5" test_ref="oval:org.mitre.oval:tst:33493"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:875" version="2" class="vulnerability">
      <metadata>
        <title>XMLSoft Libxml2 Code Execution Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>libxml2</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0110"/>
        <description>Buffer overflow in the (1) nanohttp or (2) nanoftp modules in XMLSoft Libxml 2 (Libxml2) 2.6.0 through 2.6.5 allow remote attackers to execute arbitrary code via a long URL.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-02-22T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:33.480-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:05.843-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criteria operator="OR" comment="Vulnerable Config">
          <criterion comment="libxml2 version is less than 2.5.10-6" negate="false" test_ref="oval:org.mitre.oval:tst:1609"/>
          <criterion comment="libxml2-devel version is less than 2.5.10-6" negate="false" test_ref="oval:org.mitre.oval:tst:1608"/>
          <criterion comment="libxml2-python version is less than 2.5.10-6" negate="false" test_ref="oval:org.mitre.oval:tst:1607"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:871" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 OpenSSL Improper Unknown Message Handling Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>OpenSSL</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0081"/>
        <description>OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:42.840-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:04.958-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criterion comment="openssl version is less than 0.9.7a-33.4" negate="false" test_ref="oval:org.mitre.oval:tst:1543"/>
        <criterion comment="openssl-devel version is less than 0.9.7a-33.4" negate="false" test_ref="oval:org.mitre.oval:tst:1542"/>
        <criterion comment="openssl-perl version is less than 0.9.7a-33.4" negate="false" test_ref="oval:org.mitre.oval:tst:1541"/>
        <criterion comment="openssl096b version is less than 0.9.6b-16" negate="false" test_ref="oval:org.mitre.oval:tst:1540"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:870" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 OpenSSL do_change_cipher_spec Function Denial of Service</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>OpenSSL</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0079"/>
        <description>The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:46.147-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:04.736-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criterion comment="openssl version is less than 0.9.7a-33.4" negate="false" test_ref="oval:org.mitre.oval:tst:1543"/>
        <criterion comment="openssl-devel version is less than 0.9.7a-33.4" negate="false" test_ref="oval:org.mitre.oval:tst:1542"/>
        <criterion comment="openssl-perl version is less than 0.9.7a-33.4" negate="false" test_ref="oval:org.mitre.oval:tst:1541"/>
        <criterion comment="openssl096b version is less than 0.9.6b-16" negate="false" test_ref="oval:org.mitre.oval:tst:1540"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:869" version="4" class="vulnerability">
      <metadata>
        <title>Net-SNMP MIB Information Disclosure Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Net-SNMP</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0935"/>
        <description>Net-SNMP before 5.0.9 allows a user or community to access data in MIB objects, even if that data is not allowed to be viewed.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:40.441-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:04.539-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.706-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T21:00:30.287-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:44.564-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="net-snmp version is less than 5.0.9-2.30E.1" negate="false" test_ref="oval:org.mitre.oval:tst:1545"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="snmpd is listening to the network" negate="false" test_ref="oval:org.mitre.oval:tst:1544"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:868" version="1" class="vulnerability">
      <metadata>
        <title>Linux Kernel eflags Checking Privilege Escalation Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Linux kernel</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0001"/>
        <description>Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:1547"/>
        <criterion comment="kernel version is less than 2.4.21-9.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1546"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:867" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 Linux Kernel do_mremap Denial of Service Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Linux kernel</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0985"/>
        <description>The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:44.503-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:04.347-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criteria operator="OR" comment="Vulnerable Configuration">
          <criterion comment="kernel version is less than 2.4.21-4.0.2.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1550"/>
          <criterion comment="kernel-smp version is less than 2.4.21-4.0.2.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1549"/>
          <criterion comment="kernel-bigmem version is less than 2.4.21-4.0.2.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1548"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:866" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 CVS Server root Directory Access Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>CVS server</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0977"/>
        <description>CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:42:04.684-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:04.168-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="cvs version is less than 1.11.2-14" negate="false" test_ref="oval:org.mitre.oval:tst:1551"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/ is world-writable" negate="false" test_ref="oval:org.mitre.oval:tst:1576"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:865" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 kdepim VCF File Information Reader BO</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>KDE Personal Information Management (kdepim)</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0988"/>
        <description>Buffer overflow in the VCF file information reader for KDE Personal Information Management (kdepim) suite in KDE 3.1.0 through 3.1.4 allows attackers to execute arbitrary code via a VCF file.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-05T12:00:00.000-04:00">INTERIM</status_change>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:57.566-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:03.917-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="kdepim version is less than 3.1.3-3.3" negate="false" test_ref="oval:org.mitre.oval:tst:1552"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/share/services/kfile_vcf.desktop is readable">
            <criterion comment="/usr/share/services/kfile_vcf.desktop is readable" negate="false" test_ref="oval:org.mitre.oval:tst:1563"/>
            <criterion comment="/usr/share/services/kfile_vcf.desktop is readable" negate="false" test_ref="oval:org.mitre.oval:tst:1562"/>
            <criterion comment="/usr/share/services/kfile_vcf.desktop is readable" negate="false" test_ref="oval:org.mitre.oval:tst:1561"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:864" version="4" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 Multiple stack-based BO Vulnerabilities in Apache</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Apache</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0542"/>
        <description>Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:55.327-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:03.722-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.863-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T20:55:50.726-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:44.258-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="httpd version is less than 2.0.46-26.ent" negate="false" test_ref="oval:org.mitre.oval:tst:1553"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="httpd.worker is listening on the network" negate="false" test_ref="oval:org.mitre.oval:tst:2851"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:862" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 sysstat port and trigger Scripts symlink Attack Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Sysstat</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0107"/>
        <description>The (1) post and (2) trigger scripts in sysstat 4.0.7 and earlier allow local users to overwrite arbitrary files via symlink attacks on temporary files, a different vulnerability than CVE-2004-0108.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:21.223-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:03.313-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criterion comment="sysstat version is less than 4.0.7-4.EL3.2" negate="false" test_ref="oval:org.mitre.oval:tst:1555"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:861" version="4" class="vulnerability">
      <metadata>
        <title>rpc.mountd Denial of Service via NFS Mount</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>nfs-utils packages</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0154"/>
        <description>rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mount of a directory from a client whose reverse DNS lookup name is different from the forward lookup name.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:26.329-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:03.061-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.992-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T21:00:14.572-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:43.548-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="nfs-utils version is less than 1.0.6-7.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1557"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="rpc.mountd is listening to the network" negate="false" test_ref="oval:org.mitre.oval:tst:1556"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:854" version="3" class="vulnerability">
      <metadata>
        <title>RHE3 tcpdump DoS via ISAKMP Packets II</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>tcpdump</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0057"/>
        <description>The rawprint function in the ISAKMP decoding routines (print-isakmp.c) for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via malformed ISAKMP packets that cause invalid "len" or "loc" values to be used in a loop, a different vulnerability than CVE-2003-0989.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-05T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-09T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:44.116-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:01.298-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="tcpdump version is less than 3.7.2-7.E3.1" negate="false" test_ref="oval:org.mitre.oval:tst:1578"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/sbin/tcpdump is executable">
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1582"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1581"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1580"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:853" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 tcpdump Denial of Service via print_attr_string Function</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>tcpdump</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0055"/>
        <description>The print_attr_string function in print-radius.c for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a RADIUS attribute with a large length value.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-05T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:33.687-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:01.098-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="tcpdump version is less than 3.7.2-7.E3.1" negate="false" test_ref="oval:org.mitre.oval:tst:1578"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/sbin/tcpdump is executable">
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1582"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1581"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1580"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:852" version="2" class="vulnerability">
      <metadata>
        <title>RHE3 tcpdump DoS via ISAKMP Packets</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>tcpdump</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0989"/>
        <description>tcpdump before 3.8.1 allows remote attackers to cause a denial of service (infinite loop) via certain ISAKMP packets, a different vulnerability than CVE-2004-0057.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-05T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:24.952-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:53:00.899-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="tcpdump version is less than 3.7.2-7.E3.1" negate="false" test_ref="oval:org.mitre.oval:tst:1578"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/sbin/tcpdump is executable">
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1582"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1581"/>
            <criterion comment="/usr/sbin/tcpdump is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1580"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:845" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 gdk-pixbuf Denial of Service</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>gdk-pixbuf</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0111"/>
        <description>gdk-pixbuf before 0.20 allows attackers to cause a denial of service (crash) via a malformed bitmap (BMP) file.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-05T12:00:00.000-04:00">INTERIM</status_change>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:44.319-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:59.778-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criteria operator="OR" comment="Vulnerable configuration">
          <criterion comment="gdk-pixbuf version is less than 0.22.0-6.0.3" negate="false" test_ref="oval:org.mitre.oval:tst:1589"/>
          <criterion comment="gdk-pixbuf-devel version is less than 0.22.0-6.0.3" negate="false" test_ref="oval:org.mitre.oval:tst:1588"/>
          <criterion comment="gdk-pixbuf-gnome version is less than 0.22.0-6.0.3" negate="false" test_ref="oval:org.mitre.oval:tst:1587"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:838" version="3" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 Mutt BO in Index Menu</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Mutt</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0078"/>
        <description>Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-05-05T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-09T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:33.067-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:59.230-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="mutt version is less than 1.4.1-3.4" negate="false" test_ref="oval:org.mitre.oval:tst:1603"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="/usr/bin/mutt is executable">
            <criterion comment="/usr/bin/mutt is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2637"/>
            <criterion comment="/usr/bin/mutt is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2636"/>
            <criterion comment="/usr/bin/mutt is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2635"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:833" version="2" deprecated="true" class="vulnerability">
      <metadata>
        <title>XMLSoft Libxml2 Code Execution Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>XMLSoft Libxml2</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0110"/>
        <description>Buffer overflow in the (1) nanohttp or (2) nanoftp modules in XMLSoft Libxml 2 (Libxml2) 2.6.0 through 2.6.5 allow remote attackers to execute arbitrary code via a long URL.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-06-16T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:47.353-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:58.231-04:00">ACCEPTED</status_change>
            <modified date="2007-05-08T07:29:32.570-04:00" comment="Deprecated becased this definition is a duplicate of oval:org.mitre.oval:def:875">
              <contributor organization="ThreatGuard, Inc.">Robert L. Hollis</contributor>
            </modified>
            <status_change date="2007-05-08T07:29:32.570-04:00">DEPRECATED</status_change>
          </dates>
          <status>DEPRECATED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criteria operator="OR" comment="Vulnerable Config">
          <criterion comment="libxml2 version is less than 2.5.10-6" negate="false" test_ref="oval:org.mitre.oval:tst:1609"/>
          <criterion comment="libxml2-devel version is less than 2.5.10-6" negate="false" test_ref="oval:org.mitre.oval:tst:1608"/>
          <criterion comment="libxml2-python version is less than 2.5.10-6" negate="false" test_ref="oval:org.mitre.oval:tst:1607"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:832" version="2" class="vulnerability">
      <metadata>
        <title>XFree86 Improper Handling of Font Files</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>XFree86</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0106"/>
        <description>Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:53.814-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:58.024-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="XFree86 version is less than 4.3.0-55.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1610"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="AND" comment="/usr/X11R6/bin/XFree86 is SUID and executable">
            <criterion comment="/usr/X11R6/bin/XFree86 is SUID and executable" negate="false" test_ref="oval:org.mitre.oval:tst:1640"/>
            <criteria operator="OR" comment="/usr/X11R6/bin/XFree86 is SUID and executable">
              <criterion comment="/usr/X11R6/bin/XFree86 is SUID and executable" negate="false" test_ref="oval:org.mitre.oval:tst:1639"/>
              <criterion comment="/usr/X11R6/bin/XFree86 is SUID and executable" negate="false" test_ref="oval:org.mitre.oval:tst:1638"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:831" version="2" class="vulnerability">
      <metadata>
        <title>XFree86 Buffer Overflow in CopyISOLatin1Lowered Function</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>XFree86</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0084"/>
        <description>Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:54.698-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:57.831-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="XFree86 version is less than 4.3.0-55.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1610"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="AND" comment="/usr/X11R6/bin/XFree86 is SUID and executable">
            <criterion comment="/usr/X11R6/bin/XFree86 is SUID and executable" negate="false" test_ref="oval:org.mitre.oval:tst:1640"/>
            <criteria operator="OR" comment="/usr/X11R6/bin/XFree86 is SUID and executable">
              <criterion comment="/usr/X11R6/bin/XFree86 is SUID and executable" negate="false" test_ref="oval:org.mitre.oval:tst:1639"/>
              <criterion comment="/usr/X11R6/bin/XFree86 is SUID and executable" negate="false" test_ref="oval:org.mitre.oval:tst:1638"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:830" version="2" class="vulnerability">
      <metadata>
        <title>XFree86 Buffer Overflow in dirfile</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>XFree86</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0083"/>
        <description>Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-02-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <modified date="2004-05-11T12:00:00.000-04:00" comment="Corrected pattern used in rrt-206">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:55.757-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:57.643-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="XFree86 version is less than 4.3.0-55.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1610"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="AND" comment="/usr/X11R6/bin/XFree86 is SUID and executable">
            <criterion comment="/usr/X11R6/bin/XFree86 is SUID and executable" negate="false" test_ref="oval:org.mitre.oval:tst:1640"/>
            <criteria operator="OR" comment="/usr/X11R6/bin/XFree86 is SUID and executable">
              <criterion comment="/usr/X11R6/bin/XFree86 is SUID and executable" negate="false" test_ref="oval:org.mitre.oval:tst:1639"/>
              <criterion comment="/usr/X11R6/bin/XFree86 is SUID and executable" negate="false" test_ref="oval:org.mitre.oval:tst:1638"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:827" version="4" class="vulnerability">
      <metadata>
        <title>Samba mksmboasswd Disabled Account Creation Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Samba 3.0.0 and 3.0.1</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082"/>
        <description>The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:25.833-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:57.214-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.279-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T20:57:22.153-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:38.639-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="samba version is less than 3.0.2-6.3E" negate="false" test_ref="oval:org.mitre.oval:tst:1613"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="smbd is listening on the network" negate="false" test_ref="oval:org.mitre.oval:tst:2558"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:826" version="4" class="vulnerability">
      <metadata>
        <title>RedHat Enterprise 3 Code Execution and DoS Vulnerabilities in PWLib</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>PWLib</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0097"/>
        <description>Multiple vulnerabilities in PWLib before 1.6.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Added a program_name element to rlt-217">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:26.501-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:57.025-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.033-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T20:59:24.680-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:38.346-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criterion comment="pwlib version is less than 1.4.7-7.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1614"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="a program is listening on TCP or UDP port 1720" negate="false" test_ref="oval:org.mitre.oval:tst:2320"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:825" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 Linux Kernel do_mremap Privilege Escalation Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mremap</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0077"/>
        <description>The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:35.934-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:56.836-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
        <criteria operator="OR" comment="Vulnerable Config">
          <criterion comment="kernel version is less than 2.4.21-9.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1617"/>
          <criterion comment="kernel-smp version is less than 2.4.21-9.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1616"/>
          <criterion comment="kernel-hugemem version is less than 2.4.21-9.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1615"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:817" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 Firefox and Mozilla Shared Object Code Execution</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2270"/>
        <description>Firefox before 1.0.5 and Mozilla before 1.7.9 does not properly clone base objects, which allows remote attackers to execute arbitrary code by navigating the prototype chain to reach a privileged object.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.1.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:2482"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:810" version="2" class="vulnerability">
      <metadata>
        <title>Red Hat Enterprise 3 netpbm File Overwrite Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>netpbm</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924"/>
        <description>netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-03-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <modified date="2004-05-05T12:00:00.000-04:00" comment="Corrected syntax errors in sql verion of the definition.">
              <contributor organization="The MITRE Corporation">Matt Busby</contributor>
            </modified>
            <status_change date="2004-05-25T12:00:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex to match only reasonable values for machine class. Implemented by Jon Baker of the MITRE Corporation." date="2007-04-10T15:39:00.888-04:00">
              <contributor organization="Maitreya Security">Thomas R. Jones</contributor>
            </modified>
            <status_change date="2007-04-10T15:41:26.732-04:00">INTERIM</status_change>
            <status_change date="2007-04-25T19:52:49.762-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="ix86 architecture" negate="false" test_ref="oval:org.mitre.oval:tst:3152"/>
          <criteria operator="OR" comment="Vulnerable Config">
            <criterion comment="netpbm version is less than 9.24-11.30.1" negate="false" test_ref="oval:org.mitre.oval:tst:1637"/>
            <criterion comment="netpbm-devel version is less than 9.24-11.30.1" negate="false" test_ref="oval:org.mitre.oval:tst:1636"/>
            <criterion comment="netpbm-progs version is less than 9.24-11.30.1" negate="false" test_ref="oval:org.mitre.oval:tst:1635"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criteria operator="OR" comment="Vulnerable configuration">
            <criteria operator="OR" comment="/usr/bin/411toppm is executable">
              <criterion comment="/usr/bin/411toppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2316"/>
              <criterion comment="/usr/bin/411toppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2315"/>
              <criterion comment="/usr/bin/411toppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2314"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/asciitopgm is executable">
              <criterion comment="/usr/bin/asciitopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2313"/>
              <criterion comment="/usr/bin/asciitopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2312"/>
              <criterion comment="/usr/bin/asciitopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2311"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/atktopbm is executable">
              <criterion comment="/usr/bin/atktopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2310"/>
              <criterion comment="/usr/bin/atktopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2309"/>
              <criterion comment="/usr/bin/atktopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2308"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/bioradtopgm is executable">
              <criterion comment="/usr/bin/bioradtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2307"/>
              <criterion comment="/usr/bin/bioradtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2306"/>
              <criterion comment="/usr/bin/bioradtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2305"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/bmptoppm is executable">
              <criterion comment="/usr/bin/bmptoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2304"/>
              <criterion comment="/usr/bin/bmptoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2303"/>
              <criterion comment="/usr/bin/bmptoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2302"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/brushtopbm is executable">
              <criterion comment="/usr/bin/brushtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2301"/>
              <criterion comment="/usr/bin/brushtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2300"/>
              <criterion comment="/usr/bin/brushtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2299"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/cmuwmtopbm is executable">
              <criterion comment="/usr/bin/cmuwmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2298"/>
              <criterion comment="/usr/bin/cmuwmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2297"/>
              <criterion comment="/usr/bin/cmuwmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2296"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/eyuvtoppm is executable">
              <criterion comment="/usr/bin/eyuvtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2295"/>
              <criterion comment="/usr/bin/eyuvtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2294"/>
              <criterion comment="/usr/bin/eyuvtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2293"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/fiascotopnm is executable">
              <criterion comment="/usr/bin/fiascotopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2292"/>
              <criterion comment="/usr/bin/fiascotopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2291"/>
              <criterion comment="/usr/bin/fiascotopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2290"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/fitstopnm is executable">
              <criterion comment="/usr/bin/fitstopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2289"/>
              <criterion comment="/usr/bin/fitstopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2288"/>
              <criterion comment="/usr/bin/fitstopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2287"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/fstopgm is executable">
              <criterion comment="/usr/bin/fstopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2286"/>
              <criterion comment="/usr/bin/fstopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2285"/>
              <criterion comment="/usr/bin/fstopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2284"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/g3topbm is executable">
              <criterion comment="/usr/bin/g3topbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2283"/>
              <criterion comment="/usr/bin/g3topbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2282"/>
              <criterion comment="/usr/bin/g3topbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2281"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/gemtopbm is executable">
              <criterion comment="/usr/bin/gemtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2280"/>
              <criterion comment="/usr/bin/gemtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2279"/>
              <criterion comment="/usr/bin/gemtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2278"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/gemtopnm is executable">
              <criterion comment="/usr/bin/gemtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2277"/>
              <criterion comment="/usr/bin/gemtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2276"/>
              <criterion comment="/usr/bin/gemtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2275"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/giftopnm is executable">
              <criterion comment="/usr/bin/giftopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2274"/>
              <criterion comment="/usr/bin/giftopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2273"/>
              <criterion comment="/usr/bin/giftopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2272"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/gouldtoppm is executable">
              <criterion comment="/usr/bin/gouldtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2271"/>
              <criterion comment="/usr/bin/gouldtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2270"/>
              <criterion comment="/usr/bin/gouldtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2269"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/hipstopgm is executable">
              <criterion comment="/usr/bin/hipstopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2268"/>
              <criterion comment="/usr/bin/hipstopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2267"/>
              <criterion comment="/usr/bin/hipstopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2266"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/hpcdtoppm is executable">
              <criterion comment="/usr/bin/hpcdtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2265"/>
              <criterion comment="/usr/bin/hpcdtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2264"/>
              <criterion comment="/usr/bin/hpcdtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2263"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/icontopbm is executable">
              <criterion comment="/usr/bin/icontopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2262"/>
              <criterion comment="/usr/bin/icontopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2261"/>
              <criterion comment="/usr/bin/icontopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2260"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ilbmtoppm is executable">
              <criterion comment="/usr/bin/ilbmtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2259"/>
              <criterion comment="/usr/bin/ilbmtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2258"/>
              <criterion comment="/usr/bin/ilbmtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2257"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/imgtoppm is executable">
              <criterion comment="/usr/bin/imgtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2256"/>
              <criterion comment="/usr/bin/imgtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2255"/>
              <criterion comment="/usr/bin/imgtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2254"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/jpegtopnm is executable">
              <criterion comment="/usr/bin/jpegtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2253"/>
              <criterion comment="/usr/bin/jpegtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2252"/>
              <criterion comment="/usr/bin/jpegtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2251"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/leaftoppm is executable">
              <criterion comment="/usr/bin/leaftoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2250"/>
              <criterion comment="/usr/bin/leaftoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2249"/>
              <criterion comment="/usr/bin/leaftoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2248"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/lispmtopgm is executable">
              <criterion comment="/usr/bin/lispmtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2247"/>
              <criterion comment="/usr/bin/lispmtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2246"/>
              <criterion comment="/usr/bin/lispmtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2245"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/macptopbm is executable">
              <criterion comment="/usr/bin/macptopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2244"/>
              <criterion comment="/usr/bin/macptopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2243"/>
              <criterion comment="/usr/bin/macptopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2242"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/mdatopbm is executable">
              <criterion comment="/usr/bin/mdatopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2241"/>
              <criterion comment="/usr/bin/mdatopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2240"/>
              <criterion comment="/usr/bin/mdatopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2239"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/mgrtopbm is executable">
              <criterion comment="/usr/bin/mgrtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2238"/>
              <criterion comment="/usr/bin/mgrtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2237"/>
              <criterion comment="/usr/bin/mgrtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2236"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/mtvtoppm is executable">
              <criterion comment="/usr/bin/mtvtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2235"/>
              <criterion comment="/usr/bin/mtvtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2234"/>
              <criterion comment="/usr/bin/mtvtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2233"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/neotoppm is executable">
              <criterion comment="/usr/bin/neotoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2232"/>
              <criterion comment="/usr/bin/neotoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2231"/>
              <criterion comment="/usr/bin/neotoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2230"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/palmtopnm is executable">
              <criterion comment="/usr/bin/palmtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2229"/>
              <criterion comment="/usr/bin/palmtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2228"/>
              <criterion comment="/usr/bin/palmtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2227"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pamchannel is executable">
              <criterion comment="/usr/bin/pamchannel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2226"/>
              <criterion comment="/usr/bin/pamchannel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2225"/>
              <criterion comment="/usr/bin/pamchannel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2224"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pamcut is executable">
              <criterion comment="/usr/bin/pamcut is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2223"/>
              <criterion comment="/usr/bin/pamcut is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2222"/>
              <criterion comment="/usr/bin/pamcut is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2221"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pamdeinterlace is executable">
              <criterion comment="/usr/bin/pamdeinterlace is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2220"/>
              <criterion comment="/usr/bin/pamdeinterlace is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2219"/>
              <criterion comment="/usr/bin/pamdeinterlace is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2218"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pamfile is executable">
              <criterion comment="/usr/bin/pamfile is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2217"/>
              <criterion comment="/usr/bin/pamfile is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2216"/>
              <criterion comment="/usr/bin/pamfile is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2215"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pamoil is executable">
              <criterion comment="/usr/bin/pamoil is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2214"/>
              <criterion comment="/usr/bin/pamoil is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2213"/>
              <criterion comment="/usr/bin/pamoil is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2212"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pamstretch is executable">
              <criterion comment="/usr/bin/pamstretch is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2211"/>
              <criterion comment="/usr/bin/pamstretch is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2210"/>
              <criterion comment="/usr/bin/pamstretch is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2209"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pamtopnm is executable">
              <criterion comment="/usr/bin/pamtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2208"/>
              <criterion comment="/usr/bin/pamtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2207"/>
              <criterion comment="/usr/bin/pamtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2206"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmclean is executable">
              <criterion comment="/usr/bin/pbmclean is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2205"/>
              <criterion comment="/usr/bin/pbmclean is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2204"/>
              <criterion comment="/usr/bin/pbmclean is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2203"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmlife is executable">
              <criterion comment="/usr/bin/pbmlife is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2202"/>
              <criterion comment="/usr/bin/pbmlife is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2201"/>
              <criterion comment="/usr/bin/pbmlife is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2200"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmmake is executable">
              <criterion comment="/usr/bin/pbmmake is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2199"/>
              <criterion comment="/usr/bin/pbmmake is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2198"/>
              <criterion comment="/usr/bin/pbmmake is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2197"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmmask is executable">
              <criterion comment="/usr/bin/pbmmask is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2196"/>
              <criterion comment="/usr/bin/pbmmask is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2195"/>
              <criterion comment="/usr/bin/pbmmask is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2194"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmpage is executable">
              <criterion comment="/usr/bin/pbmpage is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2193"/>
              <criterion comment="/usr/bin/pbmpage is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2192"/>
              <criterion comment="/usr/bin/pbmpage is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2191"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmpscale is executable">
              <criterion comment="/usr/bin/pbmpscale is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2190"/>
              <criterion comment="/usr/bin/pbmpscale is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2189"/>
              <criterion comment="/usr/bin/pbmpscale is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2188"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmreduce is executable">
              <criterion comment="/usr/bin/pbmreduce is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2187"/>
              <criterion comment="/usr/bin/pbmreduce is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2186"/>
              <criterion comment="/usr/bin/pbmreduce is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2185"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtext is executable">
              <criterion comment="/usr/bin/pbmtext is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2184"/>
              <criterion comment="/usr/bin/pbmtext is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2183"/>
              <criterion comment="/usr/bin/pbmtext is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2182"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmto10x is executable">
              <criterion comment="/usr/bin/pbmto10x is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2181"/>
              <criterion comment="/usr/bin/pbmto10x is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2180"/>
              <criterion comment="/usr/bin/pbmto10x is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2179"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmto4425 is executable">
              <criterion comment="/usr/bin/pbmto4425 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2178"/>
              <criterion comment="/usr/bin/pbmto4425 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2177"/>
              <criterion comment="/usr/bin/pbmto4425 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2176"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoascii is executable">
              <criterion comment="/usr/bin/pbmtoascii is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2175"/>
              <criterion comment="/usr/bin/pbmtoascii is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2174"/>
              <criterion comment="/usr/bin/pbmtoascii is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2173"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoatk is executable">
              <criterion comment="/usr/bin/pbmtoatk is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2172"/>
              <criterion comment="/usr/bin/pbmtoatk is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2171"/>
              <criterion comment="/usr/bin/pbmtoatk is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2170"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtobbnbg is executable">
              <criterion comment="/usr/bin/pbmtobbnbg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2169"/>
              <criterion comment="/usr/bin/pbmtobbnbg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2168"/>
              <criterion comment="/usr/bin/pbmtobbnbg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2167"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtocmuwm is executable">
              <criterion comment="/usr/bin/pbmtocmuwm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2166"/>
              <criterion comment="/usr/bin/pbmtocmuwm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2165"/>
              <criterion comment="/usr/bin/pbmtocmuwm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2164"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoepsi is executable">
              <criterion comment="/usr/bin/pbmtoepsi is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2163"/>
              <criterion comment="/usr/bin/pbmtoepsi is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2162"/>
              <criterion comment="/usr/bin/pbmtoepsi is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2161"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoepson is executable">
              <criterion comment="/usr/bin/pbmtoepson is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2160"/>
              <criterion comment="/usr/bin/pbmtoepson is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2159"/>
              <criterion comment="/usr/bin/pbmtoepson is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2158"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtog3 is executable">
              <criterion comment="/usr/bin/pbmtog3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2157"/>
              <criterion comment="/usr/bin/pbmtog3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2156"/>
              <criterion comment="/usr/bin/pbmtog3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2155"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtogem is executable">
              <criterion comment="/usr/bin/pbmtogem is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2154"/>
              <criterion comment="/usr/bin/pbmtogem is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2153"/>
              <criterion comment="/usr/bin/pbmtogem is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2152"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtogo is executable">
              <criterion comment="/usr/bin/pbmtogo is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2151"/>
              <criterion comment="/usr/bin/pbmtogo is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2150"/>
              <criterion comment="/usr/bin/pbmtogo is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2149"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoicon is executable">
              <criterion comment="/usr/bin/pbmtoicon is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2148"/>
              <criterion comment="/usr/bin/pbmtoicon is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2147"/>
              <criterion comment="/usr/bin/pbmtoicon is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2146"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtolj is executable">
              <criterion comment="/usr/bin/pbmtolj is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2145"/>
              <criterion comment="/usr/bin/pbmtolj is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2144"/>
              <criterion comment="/usr/bin/pbmtolj is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2143"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoln03 is executable">
              <criterion comment="/usr/bin/pbmtoln03 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2142"/>
              <criterion comment="/usr/bin/pbmtoln03 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2141"/>
              <criterion comment="/usr/bin/pbmtoln03 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2140"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtolps is executable">
              <criterion comment="/usr/bin/pbmtolps is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2139"/>
              <criterion comment="/usr/bin/pbmtolps is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2138"/>
              <criterion comment="/usr/bin/pbmtolps is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2137"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtomacp is executable">
              <criterion comment="/usr/bin/pbmtomacp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2136"/>
              <criterion comment="/usr/bin/pbmtomacp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2135"/>
              <criterion comment="/usr/bin/pbmtomacp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2134"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtomda is executable">
              <criterion comment="/usr/bin/pbmtomda is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2133"/>
              <criterion comment="/usr/bin/pbmtomda is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2132"/>
              <criterion comment="/usr/bin/pbmtomda is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2131"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtomgr is executable">
              <criterion comment="/usr/bin/pbmtomgr is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2130"/>
              <criterion comment="/usr/bin/pbmtomgr is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2129"/>
              <criterion comment="/usr/bin/pbmtomgr is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2128"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtonokia is executable">
              <criterion comment="/usr/bin/pbmtonokia is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2127"/>
              <criterion comment="/usr/bin/pbmtonokia is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2126"/>
              <criterion comment="/usr/bin/pbmtonokia is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2125"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtopgm is executable">
              <criterion comment="/usr/bin/pbmtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2124"/>
              <criterion comment="/usr/bin/pbmtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2123"/>
              <criterion comment="/usr/bin/pbmtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2122"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtopi3 is executable">
              <criterion comment="/usr/bin/pbmtopi3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2121"/>
              <criterion comment="/usr/bin/pbmtopi3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2120"/>
              <criterion comment="/usr/bin/pbmtopi3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2119"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtopk is executable">
              <criterion comment="/usr/bin/pbmtopk is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2118"/>
              <criterion comment="/usr/bin/pbmtopk is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2117"/>
              <criterion comment="/usr/bin/pbmtopk is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2116"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoplot is executable">
              <criterion comment="/usr/bin/pbmtoplot is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2115"/>
              <criterion comment="/usr/bin/pbmtoplot is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2114"/>
              <criterion comment="/usr/bin/pbmtoplot is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2113"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoppa is executable">
              <criterion comment="/usr/bin/pbmtoppa is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2112"/>
              <criterion comment="/usr/bin/pbmtoppa is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2111"/>
              <criterion comment="/usr/bin/pbmtoppa is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2110"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtopsg3 is executable">
              <criterion comment="/usr/bin/pbmtopsg3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2109"/>
              <criterion comment="/usr/bin/pbmtopsg3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2108"/>
              <criterion comment="/usr/bin/pbmtopsg3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2107"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoptx is executable">
              <criterion comment="/usr/bin/pbmtoptx is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2106"/>
              <criterion comment="/usr/bin/pbmtoptx is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2105"/>
              <criterion comment="/usr/bin/pbmtoptx is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2104"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtowbmp is executable">
              <criterion comment="/usr/bin/pbmtowbmp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2103"/>
              <criterion comment="/usr/bin/pbmtowbmp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2102"/>
              <criterion comment="/usr/bin/pbmtowbmp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2101"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtox10bm is executable">
              <criterion comment="/usr/bin/pbmtox10bm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2100"/>
              <criterion comment="/usr/bin/pbmtox10bm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2099"/>
              <criterion comment="/usr/bin/pbmtox10bm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2098"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoxbm is executable">
              <criterion comment="/usr/bin/pbmtoxbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2097"/>
              <criterion comment="/usr/bin/pbmtoxbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2096"/>
              <criterion comment="/usr/bin/pbmtoxbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2095"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtoybm is executable">
              <criterion comment="/usr/bin/pbmtoybm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2094"/>
              <criterion comment="/usr/bin/pbmtoybm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2093"/>
              <criterion comment="/usr/bin/pbmtoybm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2092"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmtozinc is executable">
              <criterion comment="/usr/bin/pbmtozinc is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2091"/>
              <criterion comment="/usr/bin/pbmtozinc is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2090"/>
              <criterion comment="/usr/bin/pbmtozinc is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2089"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pbmupc is executable">
              <criterion comment="/usr/bin/pbmupc is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2088"/>
              <criterion comment="/usr/bin/pbmupc is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2087"/>
              <criterion comment="/usr/bin/pbmupc is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2086"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pcxtoppm is executable">
              <criterion comment="/usr/bin/pcxtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2085"/>
              <criterion comment="/usr/bin/pcxtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2084"/>
              <criterion comment="/usr/bin/pcxtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2083"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmbentley is executable">
              <criterion comment="/usr/bin/pgmbentley is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2082"/>
              <criterion comment="/usr/bin/pgmbentley is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2081"/>
              <criterion comment="/usr/bin/pgmbentley is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2080"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmcrater is executable">
              <criterion comment="/usr/bin/pgmcrater is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2079"/>
              <criterion comment="/usr/bin/pgmcrater is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2078"/>
              <criterion comment="/usr/bin/pgmcrater is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2077"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmedge is executable">
              <criterion comment="/usr/bin/pgmedge is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2076"/>
              <criterion comment="/usr/bin/pgmedge is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2075"/>
              <criterion comment="/usr/bin/pgmedge is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2074"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmenhance is executable">
              <criterion comment="/usr/bin/pgmenhance is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2073"/>
              <criterion comment="/usr/bin/pgmenhance is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2072"/>
              <criterion comment="/usr/bin/pgmenhance is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2071"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmhist is executable">
              <criterion comment="/usr/bin/pgmhist is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2070"/>
              <criterion comment="/usr/bin/pgmhist is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2069"/>
              <criterion comment="/usr/bin/pgmhist is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2068"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmkernel is executable">
              <criterion comment="/usr/bin/pgmkernel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2067"/>
              <criterion comment="/usr/bin/pgmkernel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2066"/>
              <criterion comment="/usr/bin/pgmkernel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2065"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmnoise is executable">
              <criterion comment="/usr/bin/pgmnoise is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2064"/>
              <criterion comment="/usr/bin/pgmnoise is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2063"/>
              <criterion comment="/usr/bin/pgmnoise is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2062"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmnorm is executable">
              <criterion comment="/usr/bin/pgmnorm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2061"/>
              <criterion comment="/usr/bin/pgmnorm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2060"/>
              <criterion comment="/usr/bin/pgmnorm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2059"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmoil is executable">
              <criterion comment="/usr/bin/pgmoil is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2058"/>
              <criterion comment="/usr/bin/pgmoil is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2057"/>
              <criterion comment="/usr/bin/pgmoil is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2056"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmramp is executable">
              <criterion comment="/usr/bin/pgmramp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2055"/>
              <criterion comment="/usr/bin/pgmramp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2054"/>
              <criterion comment="/usr/bin/pgmramp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2053"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmslice is executable">
              <criterion comment="/usr/bin/pgmslice is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2052"/>
              <criterion comment="/usr/bin/pgmslice is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2051"/>
              <criterion comment="/usr/bin/pgmslice is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2050"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmtexture is executable">
              <criterion comment="/usr/bin/pgmtexture is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2049"/>
              <criterion comment="/usr/bin/pgmtexture is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2048"/>
              <criterion comment="/usr/bin/pgmtexture is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2047"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmtofs is executable">
              <criterion comment="/usr/bin/pgmtofs is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2046"/>
              <criterion comment="/usr/bin/pgmtofs is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2045"/>
              <criterion comment="/usr/bin/pgmtofs is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2044"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmtolispm is executable">
              <criterion comment="/usr/bin/pgmtolispm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2043"/>
              <criterion comment="/usr/bin/pgmtolispm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2042"/>
              <criterion comment="/usr/bin/pgmtolispm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2041"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmtopbm is executable">
              <criterion comment="/usr/bin/pgmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2040"/>
              <criterion comment="/usr/bin/pgmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2039"/>
              <criterion comment="/usr/bin/pgmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2038"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pgmtoppm is executable">
              <criterion comment="/usr/bin/pgmtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2037"/>
              <criterion comment="/usr/bin/pgmtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2036"/>
              <criterion comment="/usr/bin/pgmtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2035"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pi1toppm is executable">
              <criterion comment="/usr/bin/pi1toppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2034"/>
              <criterion comment="/usr/bin/pi1toppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2033"/>
              <criterion comment="/usr/bin/pi1toppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2032"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pi3topbm is executable">
              <criterion comment="/usr/bin/pi3topbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2031"/>
              <criterion comment="/usr/bin/pi3topbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2030"/>
              <criterion comment="/usr/bin/pi3topbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2029"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pjtoppm is executable">
              <criterion comment="/usr/bin/pjtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2028"/>
              <criterion comment="/usr/bin/pjtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2027"/>
              <criterion comment="/usr/bin/pjtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2026"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pktopbm is executable">
              <criterion comment="/usr/bin/pktopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2025"/>
              <criterion comment="/usr/bin/pktopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2024"/>
              <criterion comment="/usr/bin/pktopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2023"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pngtopnm is executable">
              <criterion comment="/usr/bin/pngtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2022"/>
              <criterion comment="/usr/bin/pngtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2021"/>
              <criterion comment="/usr/bin/pngtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2020"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmalias is executable">
              <criterion comment="/usr/bin/pnmalias is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2019"/>
              <criterion comment="/usr/bin/pnmalias is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2018"/>
              <criterion comment="/usr/bin/pnmalias is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2017"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmarith is executable">
              <criterion comment="/usr/bin/pnmarith is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2016"/>
              <criterion comment="/usr/bin/pnmarith is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2015"/>
              <criterion comment="/usr/bin/pnmarith is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2014"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmcat is executable">
              <criterion comment="/usr/bin/pnmcat is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2013"/>
              <criterion comment="/usr/bin/pnmcat is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2012"/>
              <criterion comment="/usr/bin/pnmcat is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2011"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmcolormap is executable">
              <criterion comment="/usr/bin/pnmcolormap is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2010"/>
              <criterion comment="/usr/bin/pnmcolormap is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2009"/>
              <criterion comment="/usr/bin/pnmcolormap is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2008"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmcomp is executable">
              <criterion comment="/usr/bin/pnmcomp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2007"/>
              <criterion comment="/usr/bin/pnmcomp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2006"/>
              <criterion comment="/usr/bin/pnmcomp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2005"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmconvol is executable">
              <criterion comment="/usr/bin/pnmconvol is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2004"/>
              <criterion comment="/usr/bin/pnmconvol is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2003"/>
              <criterion comment="/usr/bin/pnmconvol is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2002"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmcrop is executable">
              <criterion comment="/usr/bin/pnmcrop is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2001"/>
              <criterion comment="/usr/bin/pnmcrop is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2000"/>
              <criterion comment="/usr/bin/pnmcrop is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1999"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmcut is executable">
              <criterion comment="/usr/bin/pnmcut is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1998"/>
              <criterion comment="/usr/bin/pnmcut is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1997"/>
              <criterion comment="/usr/bin/pnmcut is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1996"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmdepth is executable">
              <criterion comment="/usr/bin/pnmdepth is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1995"/>
              <criterion comment="/usr/bin/pnmdepth is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1994"/>
              <criterion comment="/usr/bin/pnmdepth is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1993"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmenlarge is executable">
              <criterion comment="/usr/bin/pnmenlarge is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1992"/>
              <criterion comment="/usr/bin/pnmenlarge is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1991"/>
              <criterion comment="/usr/bin/pnmenlarge is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1990"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmfile is executable">
              <criterion comment="/usr/bin/pnmfile is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1989"/>
              <criterion comment="/usr/bin/pnmfile is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1988"/>
              <criterion comment="/usr/bin/pnmfile is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1987"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmflip is executable">
              <criterion comment="/usr/bin/pnmflip is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1986"/>
              <criterion comment="/usr/bin/pnmflip is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1985"/>
              <criterion comment="/usr/bin/pnmflip is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1984"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmgamma is executable">
              <criterion comment="/usr/bin/pnmgamma is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1983"/>
              <criterion comment="/usr/bin/pnmgamma is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1982"/>
              <criterion comment="/usr/bin/pnmgamma is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1981"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmhisteq is executable">
              <criterion comment="/usr/bin/pnmhisteq is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1980"/>
              <criterion comment="/usr/bin/pnmhisteq is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1979"/>
              <criterion comment="/usr/bin/pnmhisteq is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1978"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmhistmap is executable">
              <criterion comment="/usr/bin/pnmhistmap is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1977"/>
              <criterion comment="/usr/bin/pnmhistmap is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1976"/>
              <criterion comment="/usr/bin/pnmhistmap is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1975"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnminterp is executable">
              <criterion comment="/usr/bin/pnminterp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1974"/>
              <criterion comment="/usr/bin/pnminterp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1973"/>
              <criterion comment="/usr/bin/pnminterp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1972"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnminvert is executable">
              <criterion comment="/usr/bin/pnminvert is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1971"/>
              <criterion comment="/usr/bin/pnminvert is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1970"/>
              <criterion comment="/usr/bin/pnminvert is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1969"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmmontage is executable">
              <criterion comment="/usr/bin/pnmmontage is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1968"/>
              <criterion comment="/usr/bin/pnmmontage is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1967"/>
              <criterion comment="/usr/bin/pnmmontage is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1966"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmnlfilt is executable">
              <criterion comment="/usr/bin/pnmnlfilt is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1965"/>
              <criterion comment="/usr/bin/pnmnlfilt is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1964"/>
              <criterion comment="/usr/bin/pnmnlfilt is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1963"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmnoraw is executable">
              <criterion comment="/usr/bin/pnmnoraw is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1962"/>
              <criterion comment="/usr/bin/pnmnoraw is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1961"/>
              <criterion comment="/usr/bin/pnmnoraw is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1960"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmpad is executable">
              <criterion comment="/usr/bin/pnmpad is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1959"/>
              <criterion comment="/usr/bin/pnmpad is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1958"/>
              <criterion comment="/usr/bin/pnmpad is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1957"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmpaste is executable">
              <criterion comment="/usr/bin/pnmpaste is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1956"/>
              <criterion comment="/usr/bin/pnmpaste is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1955"/>
              <criterion comment="/usr/bin/pnmpaste is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1954"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmpsnr is executable">
              <criterion comment="/usr/bin/pnmpsnr is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1953"/>
              <criterion comment="/usr/bin/pnmpsnr is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1952"/>
              <criterion comment="/usr/bin/pnmpsnr is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1951"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmremap is executable">
              <criterion comment="/usr/bin/pnmremap is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1950"/>
              <criterion comment="/usr/bin/pnmremap is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1949"/>
              <criterion comment="/usr/bin/pnmremap is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1948"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmrotate is executable">
              <criterion comment="/usr/bin/pnmrotate is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1947"/>
              <criterion comment="/usr/bin/pnmrotate is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1946"/>
              <criterion comment="/usr/bin/pnmrotate is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1945"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmscale is executable">
              <criterion comment="/usr/bin/pnmscale is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1944"/>
              <criterion comment="/usr/bin/pnmscale is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1943"/>
              <criterion comment="/usr/bin/pnmscale is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1942"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtopict is executable">
              <criterion comment="/usr/bin/ppmtopict is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1941"/>
              <criterion comment="/usr/bin/ppmtopict is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1940"/>
              <criterion comment="/usr/bin/ppmtopict is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1939"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtopj is executable">
              <criterion comment="/usr/bin/ppmtopj is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1938"/>
              <criterion comment="/usr/bin/ppmtopj is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1937"/>
              <criterion comment="/usr/bin/ppmtopj is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1936"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtopjxl is executable">
              <criterion comment="/usr/bin/ppmtopjxl is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1935"/>
              <criterion comment="/usr/bin/ppmtopjxl is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1934"/>
              <criterion comment="/usr/bin/ppmtopjxl is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1933"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtopuzz is executable">
              <criterion comment="/usr/bin/ppmtopuzz is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1932"/>
              <criterion comment="/usr/bin/ppmtopuzz is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1931"/>
              <criterion comment="/usr/bin/ppmtopuzz is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1930"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtorgb3 is executable">
              <criterion comment="/usr/bin/ppmtorgb3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1929"/>
              <criterion comment="/usr/bin/ppmtorgb3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1928"/>
              <criterion comment="/usr/bin/ppmtorgb3 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1927"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtosixel is executable">
              <criterion comment="/usr/bin/ppmtosixel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1926"/>
              <criterion comment="/usr/bin/ppmtosixel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1925"/>
              <criterion comment="/usr/bin/ppmtosixel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1924"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtotga is executable">
              <criterion comment="/usr/bin/ppmtotga is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1923"/>
              <criterion comment="/usr/bin/ppmtotga is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1922"/>
              <criterion comment="/usr/bin/ppmtotga is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1921"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtouil is executable">
              <criterion comment="/usr/bin/ppmtouil is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1920"/>
              <criterion comment="/usr/bin/ppmtouil is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1919"/>
              <criterion comment="/usr/bin/ppmtouil is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1918"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtowinicon is executable">
              <criterion comment="/usr/bin/ppmtowinicon is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1917"/>
              <criterion comment="/usr/bin/ppmtowinicon is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1916"/>
              <criterion comment="/usr/bin/ppmtowinicon is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1915"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtoxpm is executable">
              <criterion comment="/usr/bin/ppmtoxpm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1914"/>
              <criterion comment="/usr/bin/ppmtoxpm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1913"/>
              <criterion comment="/usr/bin/ppmtoxpm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1912"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtoyuv is executable">
              <criterion comment="/usr/bin/ppmtoyuv is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1911"/>
              <criterion comment="/usr/bin/ppmtoyuv is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1910"/>
              <criterion comment="/usr/bin/ppmtoyuv is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1909"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtoyuvsplit is executable">
              <criterion comment="/usr/bin/ppmtoyuvsplit is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1908"/>
              <criterion comment="/usr/bin/ppmtoyuvsplit is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1907"/>
              <criterion comment="/usr/bin/ppmtoyuvsplit is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1906"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtv is executable">
              <criterion comment="/usr/bin/ppmtv is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1905"/>
              <criterion comment="/usr/bin/ppmtv is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1904"/>
              <criterion comment="/usr/bin/ppmtv is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1903"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/psidtopgm is executable">
              <criterion comment="/usr/bin/psidtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1902"/>
              <criterion comment="/usr/bin/psidtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1901"/>
              <criterion comment="/usr/bin/psidtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1900"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pstopnm is executable">
              <criterion comment="/usr/bin/pstopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1899"/>
              <criterion comment="/usr/bin/pstopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1898"/>
              <criterion comment="/usr/bin/pstopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1897"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/qrttoppm is executable">
              <criterion comment="/usr/bin/qrttoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1896"/>
              <criterion comment="/usr/bin/qrttoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1895"/>
              <criterion comment="/usr/bin/qrttoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1894"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/rasttopnm is executable">
              <criterion comment="/usr/bin/rasttopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1893"/>
              <criterion comment="/usr/bin/rasttopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1892"/>
              <criterion comment="/usr/bin/rasttopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1891"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/rawtopgm is executable">
              <criterion comment="/usr/bin/rawtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1890"/>
              <criterion comment="/usr/bin/rawtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1889"/>
              <criterion comment="/usr/bin/rawtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1888"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/rawtoppm is executable">
              <criterion comment="/usr/bin/rawtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1887"/>
              <criterion comment="/usr/bin/rawtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1886"/>
              <criterion comment="/usr/bin/rawtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1885"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/rgb3toppm is executable">
              <criterion comment="/usr/bin/rgb3toppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1884"/>
              <criterion comment="/usr/bin/rgb3toppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1883"/>
              <criterion comment="/usr/bin/rgb3toppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1882"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/rletopnm is executable">
              <criterion comment="/usr/bin/rletopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1881"/>
              <criterion comment="/usr/bin/rletopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1880"/>
              <criterion comment="/usr/bin/rletopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1879"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/sbigtopgm is executable">
              <criterion comment="/usr/bin/sbigtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1878"/>
              <criterion comment="/usr/bin/sbigtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1877"/>
              <criterion comment="/usr/bin/sbigtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1876"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/sgitopnm is executable">
              <criterion comment="/usr/bin/sgitopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1875"/>
              <criterion comment="/usr/bin/sgitopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1874"/>
              <criterion comment="/usr/bin/sgitopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1873"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/sirtopnm is executable">
              <criterion comment="/usr/bin/sirtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1872"/>
              <criterion comment="/usr/bin/sirtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1871"/>
              <criterion comment="/usr/bin/sirtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1870"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/sldtoppm is executable">
              <criterion comment="/usr/bin/sldtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1869"/>
              <criterion comment="/usr/bin/sldtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1868"/>
              <criterion comment="/usr/bin/sldtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1867"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/spctoppm is executable">
              <criterion comment="/usr/bin/spctoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1866"/>
              <criterion comment="/usr/bin/spctoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1865"/>
              <criterion comment="/usr/bin/spctoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1864"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/spottopgm is executable">
              <criterion comment="/usr/bin/spottopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1863"/>
              <criterion comment="/usr/bin/spottopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1862"/>
              <criterion comment="/usr/bin/spottopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1861"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/sputoppm is executable">
              <criterion comment="/usr/bin/sputoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1860"/>
              <criterion comment="/usr/bin/sputoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1859"/>
              <criterion comment="/usr/bin/sputoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1858"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/tgatoppm is executable">
              <criterion comment="/usr/bin/tgatoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1857"/>
              <criterion comment="/usr/bin/tgatoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1856"/>
              <criterion comment="/usr/bin/tgatoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1855"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/thinkjettopbm is executable">
              <criterion comment="/usr/bin/thinkjettopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1854"/>
              <criterion comment="/usr/bin/thinkjettopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1853"/>
              <criterion comment="/usr/bin/thinkjettopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1852"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/tifftopnm is executable">
              <criterion comment="/usr/bin/tifftopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1851"/>
              <criterion comment="/usr/bin/tifftopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1850"/>
              <criterion comment="/usr/bin/tifftopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1849"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/wbmptopbm is executable">
              <criterion comment="/usr/bin/wbmptopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1848"/>
              <criterion comment="/usr/bin/wbmptopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1847"/>
              <criterion comment="/usr/bin/wbmptopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1846"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/winicontoppm is executable">
              <criterion comment="/usr/bin/winicontoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1845"/>
              <criterion comment="/usr/bin/winicontoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1844"/>
              <criterion comment="/usr/bin/winicontoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1843"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/xbmtopbm is executable">
              <criterion comment="/usr/bin/xbmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1842"/>
              <criterion comment="/usr/bin/xbmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1841"/>
              <criterion comment="/usr/bin/xbmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1840"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ximtoppm is executable">
              <criterion comment="/usr/bin/ximtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1839"/>
              <criterion comment="/usr/bin/ximtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1838"/>
              <criterion comment="/usr/bin/ximtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1837"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/xpmtoppm is executable">
              <criterion comment="/usr/bin/xpmtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1836"/>
              <criterion comment="/usr/bin/xpmtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1835"/>
              <criterion comment="/usr/bin/xpmtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1834"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/xvminitoppm is executable">
              <criterion comment="/usr/bin/xvminitoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1833"/>
              <criterion comment="/usr/bin/xvminitoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1832"/>
              <criterion comment="/usr/bin/xvminitoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1831"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/xwdtopnm is executable">
              <criterion comment="/usr/bin/xwdtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1830"/>
              <criterion comment="/usr/bin/xwdtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1829"/>
              <criterion comment="/usr/bin/xwdtopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1828"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ybmtopbm is executable">
              <criterion comment="/usr/bin/ybmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1827"/>
              <criterion comment="/usr/bin/ybmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1826"/>
              <criterion comment="/usr/bin/ybmtopbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1825"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/yuvsplittoppm is executable">
              <criterion comment="/usr/bin/yuvsplittoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1824"/>
              <criterion comment="/usr/bin/yuvsplittoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1823"/>
              <criterion comment="/usr/bin/yuvsplittoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1822"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/yuvtoppm is executable">
              <criterion comment="/usr/bin/yuvtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1821"/>
              <criterion comment="/usr/bin/yuvtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1820"/>
              <criterion comment="/usr/bin/yuvtoppm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1819"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/zeisstopnm is executable">
              <criterion comment="/usr/bin/zeisstopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1818"/>
              <criterion comment="/usr/bin/zeisstopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1817"/>
              <criterion comment="/usr/bin/zeisstopnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1816"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmscalefixed is executable">
              <criterion comment="/usr/bin/pnmscalefixed is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1815"/>
              <criterion comment="/usr/bin/pnmscalefixed is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1814"/>
              <criterion comment="/usr/bin/pnmscalefixed is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1813"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmshear is executable">
              <criterion comment="/usr/bin/pnmshear is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1812"/>
              <criterion comment="/usr/bin/pnmshear is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1811"/>
              <criterion comment="/usr/bin/pnmshear is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1810"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmsmooth is executable">
              <criterion comment="/usr/bin/pnmsmooth is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1809"/>
              <criterion comment="/usr/bin/pnmsmooth is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1808"/>
              <criterion comment="/usr/bin/pnmsmooth is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1807"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmsplit is executable">
              <criterion comment="/usr/bin/pnmsplit is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1806"/>
              <criterion comment="/usr/bin/pnmsplit is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1805"/>
              <criterion comment="/usr/bin/pnmsplit is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1804"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtile is executable">
              <criterion comment="/usr/bin/pnmtile is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1803"/>
              <criterion comment="/usr/bin/pnmtile is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1802"/>
              <criterion comment="/usr/bin/pnmtile is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1801"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtoddif is executable">
              <criterion comment="/usr/bin/pnmtoddif is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1800"/>
              <criterion comment="/usr/bin/pnmtoddif is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1799"/>
              <criterion comment="/usr/bin/pnmtoddif is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1798"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtofiasco is executable">
              <criterion comment="/usr/bin/pnmtofiasco is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1797"/>
              <criterion comment="/usr/bin/pnmtofiasco is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1796"/>
              <criterion comment="/usr/bin/pnmtofiasco is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1795"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtofits is executable">
              <criterion comment="/usr/bin/pnmtofits is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1794"/>
              <criterion comment="/usr/bin/pnmtofits is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1793"/>
              <criterion comment="/usr/bin/pnmtofits is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1792"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtojpeg is executable">
              <criterion comment="/usr/bin/pnmtojpeg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1791"/>
              <criterion comment="/usr/bin/pnmtojpeg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1790"/>
              <criterion comment="/usr/bin/pnmtojpeg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1789"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtopalm is executable">
              <criterion comment="/usr/bin/pnmtopalm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1788"/>
              <criterion comment="/usr/bin/pnmtopalm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1787"/>
              <criterion comment="/usr/bin/pnmtopalm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1786"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtoplainpnm is executable">
              <criterion comment="/usr/bin/pnmtoplainpnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1785"/>
              <criterion comment="/usr/bin/pnmtoplainpnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1784"/>
              <criterion comment="/usr/bin/pnmtoplainpnm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1783"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtopng is executable">
              <criterion comment="/usr/bin/pnmtopng is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1782"/>
              <criterion comment="/usr/bin/pnmtopng is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1781"/>
              <criterion comment="/usr/bin/pnmtopng is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1780"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtops is executable">
              <criterion comment="/usr/bin/pnmtops is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1779"/>
              <criterion comment="/usr/bin/pnmtops is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1778"/>
              <criterion comment="/usr/bin/pnmtops is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1777"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtorast is executable">
              <criterion comment="/usr/bin/pnmtorast is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1776"/>
              <criterion comment="/usr/bin/pnmtorast is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1775"/>
              <criterion comment="/usr/bin/pnmtorast is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1774"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtorle is executable">
              <criterion comment="/usr/bin/pnmtorle is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1773"/>
              <criterion comment="/usr/bin/pnmtorle is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1772"/>
              <criterion comment="/usr/bin/pnmtorle is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1771"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtosgi is executable">
              <criterion comment="/usr/bin/pnmtosgi is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1770"/>
              <criterion comment="/usr/bin/pnmtosgi is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1769"/>
              <criterion comment="/usr/bin/pnmtosgi is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1768"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtosir is executable">
              <criterion comment="/usr/bin/pnmtosir is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1767"/>
              <criterion comment="/usr/bin/pnmtosir is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1766"/>
              <criterion comment="/usr/bin/pnmtosir is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1765"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtotiff is executable">
              <criterion comment="/usr/bin/pnmtotiff is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1764"/>
              <criterion comment="/usr/bin/pnmtotiff is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1763"/>
              <criterion comment="/usr/bin/pnmtotiff is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1762"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtotiffcmyk is executable">
              <criterion comment="/usr/bin/pnmtotiffcmyk is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1761"/>
              <criterion comment="/usr/bin/pnmtotiffcmyk is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1760"/>
              <criterion comment="/usr/bin/pnmtotiffcmyk is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1759"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/pnmtoxwd is executable">
              <criterion comment="/usr/bin/pnmtoxwd is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1758"/>
              <criterion comment="/usr/bin/pnmtoxwd is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1757"/>
              <criterion comment="/usr/bin/pnmtoxwd is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1756"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppm3d is executable">
              <criterion comment="/usr/bin/ppm3d is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1755"/>
              <criterion comment="/usr/bin/ppm3d is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1754"/>
              <criterion comment="/usr/bin/ppm3d is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1753"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmbrighten is executable">
              <criterion comment="/usr/bin/ppmbrighten is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1752"/>
              <criterion comment="/usr/bin/ppmbrighten is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1751"/>
              <criterion comment="/usr/bin/ppmbrighten is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1750"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmchange is executable">
              <criterion comment="/usr/bin/ppmchange is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1749"/>
              <criterion comment="/usr/bin/ppmchange is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1748"/>
              <criterion comment="/usr/bin/ppmchange is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1747"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmcie is executable">
              <criterion comment="/usr/bin/ppmcie is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1746"/>
              <criterion comment="/usr/bin/ppmcie is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1745"/>
              <criterion comment="/usr/bin/ppmcie is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1744"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmcolormask is executable">
              <criterion comment="/usr/bin/ppmcolormask is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1743"/>
              <criterion comment="/usr/bin/ppmcolormask is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1742"/>
              <criterion comment="/usr/bin/ppmcolormask is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1741"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmcolors is executable">
              <criterion comment="/usr/bin/ppmcolors is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1740"/>
              <criterion comment="/usr/bin/ppmcolors is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1739"/>
              <criterion comment="/usr/bin/ppmcolors is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1738"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmdim is executable">
              <criterion comment="/usr/bin/ppmdim is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1737"/>
              <criterion comment="/usr/bin/ppmdim is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1736"/>
              <criterion comment="/usr/bin/ppmdim is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1735"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmdist is executable">
              <criterion comment="/usr/bin/ppmdist is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1734"/>
              <criterion comment="/usr/bin/ppmdist is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1733"/>
              <criterion comment="/usr/bin/ppmdist is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1732"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmdither is executable">
              <criterion comment="/usr/bin/ppmdither is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1731"/>
              <criterion comment="/usr/bin/ppmdither is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1730"/>
              <criterion comment="/usr/bin/ppmdither is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1729"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmflash is executable">
              <criterion comment="/usr/bin/ppmflash is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1728"/>
              <criterion comment="/usr/bin/ppmflash is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1727"/>
              <criterion comment="/usr/bin/ppmflash is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1726"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmforge is executable">
              <criterion comment="/usr/bin/ppmforge is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1725"/>
              <criterion comment="/usr/bin/ppmforge is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1724"/>
              <criterion comment="/usr/bin/ppmforge is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1723"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmhist is executable">
              <criterion comment="/usr/bin/ppmhist is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1722"/>
              <criterion comment="/usr/bin/ppmhist is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1721"/>
              <criterion comment="/usr/bin/ppmhist is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1720"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmlabel is executable">
              <criterion comment="/usr/bin/ppmlabel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1719"/>
              <criterion comment="/usr/bin/ppmlabel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1718"/>
              <criterion comment="/usr/bin/ppmlabel is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1717"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmmake is executable">
              <criterion comment="/usr/bin/ppmmake is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1716"/>
              <criterion comment="/usr/bin/ppmmake is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1715"/>
              <criterion comment="/usr/bin/ppmmake is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1714"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmmix is executable">
              <criterion comment="/usr/bin/ppmmix is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1713"/>
              <criterion comment="/usr/bin/ppmmix is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1712"/>
              <criterion comment="/usr/bin/ppmmix is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1711"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmnorm is executable">
              <criterion comment="/usr/bin/ppmnorm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1710"/>
              <criterion comment="/usr/bin/ppmnorm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1709"/>
              <criterion comment="/usr/bin/ppmnorm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1708"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmntsc is executable">
              <criterion comment="/usr/bin/ppmntsc is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1707"/>
              <criterion comment="/usr/bin/ppmntsc is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1706"/>
              <criterion comment="/usr/bin/ppmntsc is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1705"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmpat is executable">
              <criterion comment="/usr/bin/ppmpat is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1704"/>
              <criterion comment="/usr/bin/ppmpat is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1703"/>
              <criterion comment="/usr/bin/ppmpat is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1702"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmquant is executable">
              <criterion comment="/usr/bin/ppmquant is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1701"/>
              <criterion comment="/usr/bin/ppmquant is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1700"/>
              <criterion comment="/usr/bin/ppmquant is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1699"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmqvga is executable">
              <criterion comment="/usr/bin/ppmqvga is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1698"/>
              <criterion comment="/usr/bin/ppmqvga is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1697"/>
              <criterion comment="/usr/bin/ppmqvga is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1696"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmrelief is executable">
              <criterion comment="/usr/bin/ppmrelief is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1695"/>
              <criterion comment="/usr/bin/ppmrelief is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1694"/>
              <criterion comment="/usr/bin/ppmrelief is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1693"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmshift is executable">
              <criterion comment="/usr/bin/ppmshift is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1692"/>
              <criterion comment="/usr/bin/ppmshift is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1691"/>
              <criterion comment="/usr/bin/ppmshift is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1690"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmspread is executable">
              <criterion comment="/usr/bin/ppmspread is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1689"/>
              <criterion comment="/usr/bin/ppmspread is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1688"/>
              <criterion comment="/usr/bin/ppmspread is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1687"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtoacad is executable">
              <criterion comment="/usr/bin/ppmtoacad is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1686"/>
              <criterion comment="/usr/bin/ppmtoacad is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1685"/>
              <criterion comment="/usr/bin/ppmtoacad is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1684"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtobmp is executable">
              <criterion comment="/usr/bin/ppmtobmp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1683"/>
              <criterion comment="/usr/bin/ppmtobmp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1682"/>
              <criterion comment="/usr/bin/ppmtobmp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1681"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtoeyuv is executable">
              <criterion comment="/usr/bin/ppmtoeyuv is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1680"/>
              <criterion comment="/usr/bin/ppmtoeyuv is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1679"/>
              <criterion comment="/usr/bin/ppmtoeyuv is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1678"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtogif is executable">
              <criterion comment="/usr/bin/ppmtogif is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1677"/>
              <criterion comment="/usr/bin/ppmtogif is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1676"/>
              <criterion comment="/usr/bin/ppmtogif is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1675"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtoicr is executable">
              <criterion comment="/usr/bin/ppmtoicr is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1674"/>
              <criterion comment="/usr/bin/ppmtoicr is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1673"/>
              <criterion comment="/usr/bin/ppmtoicr is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1672"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtoilbm is executable">
              <criterion comment="/usr/bin/ppmtoilbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1671"/>
              <criterion comment="/usr/bin/ppmtoilbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1670"/>
              <criterion comment="/usr/bin/ppmtoilbm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1669"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtojpeg is executable">
              <criterion comment="/usr/bin/ppmtojpeg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1668"/>
              <criterion comment="/usr/bin/ppmtojpeg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1667"/>
              <criterion comment="/usr/bin/ppmtojpeg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1666"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtoleaf is executable">
              <criterion comment="/usr/bin/ppmtoleaf is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1665"/>
              <criterion comment="/usr/bin/ppmtoleaf is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1664"/>
              <criterion comment="/usr/bin/ppmtoleaf is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1663"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtolj is executable">
              <criterion comment="/usr/bin/ppmtolj is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1662"/>
              <criterion comment="/usr/bin/ppmtolj is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1661"/>
              <criterion comment="/usr/bin/ppmtolj is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1660"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtomitsu is executable">
              <criterion comment="/usr/bin/ppmtomitsu is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1659"/>
              <criterion comment="/usr/bin/ppmtomitsu is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1658"/>
              <criterion comment="/usr/bin/ppmtomitsu is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1657"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtompeg is executable">
              <criterion comment="/usr/bin/ppmtompeg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1656"/>
              <criterion comment="/usr/bin/ppmtompeg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1655"/>
              <criterion comment="/usr/bin/ppmtompeg is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1654"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtoneo is executable">
              <criterion comment="/usr/bin/ppmtoneo is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1653"/>
              <criterion comment="/usr/bin/ppmtoneo is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1652"/>
              <criterion comment="/usr/bin/ppmtoneo is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1651"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtopcx is executable">
              <criterion comment="/usr/bin/ppmtopcx is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1650"/>
              <criterion comment="/usr/bin/ppmtopcx is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1649"/>
              <criterion comment="/usr/bin/ppmtopcx is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1648"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtopgm is executable">
              <criterion comment="/usr/bin/ppmtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1647"/>
              <criterion comment="/usr/bin/ppmtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1646"/>
              <criterion comment="/usr/bin/ppmtopgm is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1645"/>
            </criteria>
            <criteria operator="OR" comment="/usr/bin/ppmtopi1 is executable">
              <criterion comment="/usr/bin/ppmtopi1 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1644"/>
              <criterion comment="/usr/bin/ppmtopi1 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1643"/>
              <criterion comment="/usr/bin/ppmtopi1 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1642"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:781" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 InstallVersion.compareTo() DoS and Code Execution Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2265"/>
        <description>Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.1.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:2482"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:773" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 Mozilla top.focus() Cross-Site Scripting Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2266"/>
        <description>Firefox before 1.0.5 and Mozilla before 1.7.9 allows a child frame to call top.focus and other methods in a parent frame, even when the parent is in a different domain, which violates the same origin policy and allows remote attackers to steal sensitive information such as cookies and passwords from web sites whose child frames do not verify that they are in the same domain as their parents.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.1.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:2482"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:749" version="1" class="vulnerability">
      <metadata>
        <title>bzip2 Decompression Bomb</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>bzip2</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1260"/>
        <description>bzip2 allows remote attackers to cause a denial of service (hard drive consumption) via a crafted bzip2 file that causes an infinite loop (a.k.a "decompression bomb").</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-11T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="bzip2 RPM earlier than 0:1.0.2-11.EL3.4" negate="false" test_ref="oval:org.mitre.oval:tst:2386"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/bzip2 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2385"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:744" version="1" class="vulnerability">
      <metadata>
        <title>Gaim DoS via Yahoo! Message</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Gaim</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1269"/>
        <description>Gaim before 1.3.1 allows remote attackers to cause a denial of service (application crash) via a Yahoo! message with non-ASCII characters in a file name.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-11T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="gaim RPM earlier than 1:1.3.1-0.el3" negate="false" test_ref="oval:org.mitre.oval:tst:2740"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/gaim is executable by any user" negate="false" test_ref="oval:org.mitre.oval:tst:2739"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:742" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 Improper Handling of Synthetic Events in Mozilla</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2260"/>
        <description>The browser user interface in Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 does not properly distinguish between user-generated events and untrusted synthetic events, which makes it easier for remote attackers to perform dangerous actions that normally could only be performed manually by the user.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.1.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:2482"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:717" version="2" class="vulnerability">
      <metadata>
        <title>gftp Directory Traversal Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>gftp</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0372"/>
        <description>Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-22T12:38:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
            <modified date="2006-01-25T10:22:00.000-04:00" comment="modified upt-62 - Changed DATA operation to OR (to test for any exec bit set, not all).  Fixed typo in comment.">
              <contributor organization="The MITRE Corporation">Matthew Wojcik</contributor>
            </modified>
            <status_change date="2006-01-25T07:27:00.000-04:00">INTERIM</status_change>
            <status_change date="2006-02-22T08:27:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="gftp rpm is earlier than 1:2.0.14-4" negate="false" test_ref="oval:org.mitre.oval:tst:2394"/>
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="gftp is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2393"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:711" version="1" class="vulnerability">
      <metadata>
        <title>ImageMagick Buffer Overflow in ReadPNMImage()</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>ImageMagick</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1275"/>
        <description>Heap-based buffer overflow in the ReadPNMImage function in pnm.c for ImageMagick 6.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a PNM file with a small colors value.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-28T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-29T06:49:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criterion comment="ImageMagick RPM earlier than 0:5.5.6-14" negate="false" test_ref="oval:org.mitre.oval:tst:2401"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:676" version="1" class="vulnerability">
      <metadata>
        <title>PostgreSQL Character Conversion Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>postgresql</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1409"/>
        <description>PostgreSQL 7.3.x through 8.0.x gives public EXECUTE access to certain character conversion functions, which allows unprivileged users to call those functions with malicious values, with unknown impact, aka the "Character conversion vulnerability."</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-27T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-29T06:49:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="rh-postgresql-server is earlier than 0:7.3.10-1" negate="false" test_ref="oval:org.mitre.oval:tst:2433"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="postmaster (the PostgreSQL master daemon) is running" negate="false" test_ref="oval:org.mitre.oval:tst:2432"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:647" version="1" class="vulnerability">
      <metadata>
        <title>mikmod Long Filename Buffer Overflow</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mikmod</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0427"/>
        <description>Buffer overflow in mikmod 3.1.6 and earlier allows remote attackers to execute arbitrary code via an archive file that contains a file with a long filename.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-22T12:38:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="mikmod RPM prior to 0:3.1.6-22.EL3" negate="false" test_ref="oval:org.mitre.oval:tst:2474"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mikmod is executable by any user" negate="false" test_ref="oval:org.mitre.oval:tst:2473"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:637" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 Firefox and Mozilla Framed Site Spoofing Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1937"/>
        <description>A regression error in Firefox 1.0.3 and Mozilla 1.7.7 allows remote attackers to inject arbitrary Javascript from one page into the frameset of another site, aka the frame injection spoofing vulnerability, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2004-0718.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.1.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:2482"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:623" version="1" class="vulnerability">
      <metadata>
        <title>sysreport Plaintext Password Leak</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>sysreport</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1760"/>
        <description>sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-11T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="sysreport RPM earlier than 0:1.3.7.2-6" negate="false" test_ref="oval:org.mitre.oval:tst:2494"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/tmp is world-writable" negate="false" test_ref="oval:org.mitre.oval:tst:2493"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:382" version="1" class="vulnerability">
      <metadata>
        <title>gzip Directory Traversal Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>gzip</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228"/>
        <description>Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-22T12:38:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="gzip RPM earlier than 0:1.3.3-12rhel3" negate="false" test_ref="oval:org.mitre.oval:tst:2667"/>
        </criteria>
        <criteria comment="Configuration section" operator="OR">
          <criterion comment="/usr/bin/gzip is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2666"/>
          <criterion comment="/usr/bin/gunzip is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2665"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:3657" version="1" class="vulnerability">
      <metadata>
        <title>Portable Network Graphics Library Offset Calculation Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>libpng</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2002-1363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1363"/>
        <description>Portable Network Graphics (PNG) library libpng 1.2.5 and earlier does not correctly calculate offsets, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a buffer overflow attack on the row buffers.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-09-03T04:26:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-09-08T10:41:00.000-04:00">DRAFT</status_change>
            <status_change date="2004-09-22T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-10-06T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criteria operator="OR" comment="libpng or libpng-devel rpm older than 1.2.2-24, Epoch 2 OR libpng10or libpng10-devel rpm older than 1.0.13-14, Epoch 0">
          <criterion comment="libpng rpm older than 1.2.2-24, Epoch 2" negate="false" test_ref="oval:org.mitre.oval:tst:388"/>
          <criterion comment="libpng-devel rpm older than 1.2.2-24, Epoch 2" negate="false" test_ref="oval:org.mitre.oval:tst:387"/>
          <criterion comment="libpng10-devel rpm older than 1.0.13-14, Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:386"/>
          <criterion comment="libpng10 rpm older than 1.0.13-14, Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:385"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:358" version="1" class="vulnerability">
      <metadata>
        <title>cpio Race Condition</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>cpio</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1111"/>
        <description>Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-08T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-09T07:56:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-24T09:56:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="cpio rpm is older than 0:2.5-4.RHEL3" negate="false" test_ref="oval:org.mitre.oval:tst:2683"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/bin/cpio is executable by all" negate="false" test_ref="oval:org.mitre.oval:tst:2682"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:350" version="1" class="vulnerability">
      <metadata>
        <title>PEAR XML_RPC PHP Code Execution Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>php</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1921"/>
        <description>Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-19T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="php RPM prior to  0:4.3.2-24.ent" negate="false" test_ref="oval:org.mitre.oval:tst:2687"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/etc/httpd/conf.d/php.conf exists" negate="false" test_ref="oval:org.mitre.oval:tst:2684"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:345" version="1" class="vulnerability">
      <metadata>
        <title>shtool Race Condition</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>php</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1751"/>
        <description>Race condition in shtool 2.0.1 and earlier allows local users to create or modify arbitrary files via a symlink attack on the .shtool.$$ temporary file, a different vulnerability than CVE-2005-1759.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-19T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="php RPM prior to  0:4.3.2-24.ent" negate="false" test_ref="oval:org.mitre.oval:tst:2687"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/tmp is writable by everyone" negate="false" test_ref="oval:org.mitre.oval:tst:2856"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:2961" version="1" class="vulnerability">
      <metadata>
        <title>Multiple Privilege Escalation Vulnerabilities in Linux Kernel</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Linux kernel</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0495"/>
        <description>Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-09-02T12:06:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-09-08T10:41:00.000-04:00">DRAFT</status_change>
            <status_change date="2004-09-22T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-10-06T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criteria operator="OR" comment="kernel, kernel-hugemem or kernel-smp rpm older than 2.4.21-15.0.2EL Epoch 0">
          <criterion comment="kernel rpm older than 2.4.21-15.0.2.EL Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:476"/>
          <criterion comment="kernel-hugemem rpm older than 2.4.21-15.0.2.EL Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:475"/>
          <criterion comment="kernel-smp rpm older than 2.4.21-15.0.2.EL Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:474"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:2915" version="1" class="vulnerability">
      <metadata>
        <title>Linux Kernel Denial of Service Vulnerability via fsave and frstor Instructions</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Linux kernel</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0554"/>
        <description>Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-09-02T12:10:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-09-08T10:41:00.000-04:00">DRAFT</status_change>
            <status_change date="2004-09-22T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-10-06T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criteria operator="OR" comment="kernel, kernel-hugemem or kernel-smp rpm older than 2.4.21-15.0.2EL Epoch 0">
          <criterion comment="kernel rpm older than 2.4.21-15.0.2.EL Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:476"/>
          <criterion comment="kernel-hugemem rpm older than 2.4.21-15.0.2.EL Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:475"/>
          <criterion comment="kernel-smp rpm older than 2.4.21-15.0.2.EL Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:474"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:2819" version="1" class="vulnerability">
      <metadata>
        <title>Denial of Service Vulnerability in Linux Kernel do_fork Function via CLONE_VM</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Linux kernel</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0427"/>
        <description>The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-09-01T11:51:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2004-09-08T10:41:00.000-04:00">DRAFT</status_change>
            <status_change date="2004-09-22T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2004-10-06T12:00:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criteria operator="OR" comment="kernel, kernel-hugemem or kernel-smp rpm older than 2.4.21-15.0.2EL Epoch 0">
          <criterion comment="kernel rpm older than 2.4.21-15.0.2.EL Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:476"/>
          <criterion comment="kernel-hugemem rpm older than 2.4.21-15.0.2.EL Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:475"/>
          <criterion comment="kernel-smp rpm older than 2.4.21-15.0.2.EL Epoch 0" negate="false" test_ref="oval:org.mitre.oval:tst:474"/>
        </criteria>
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:263" version="1" class="vulnerability">
      <metadata>
        <title>Gaim DoS via Malformed MSN Message</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Gaim</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1934"/>
        <description>Gaim before 1.3.1 allows remote attackers to cause a denial of service (crash) via a malformed MSN message that leads to a memory allocation of a large size, possibly due to an integer signedness error.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-11T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="gaim RPM earlier than 1:1.3.1-0.el3" negate="false" test_ref="oval:org.mitre.oval:tst:2740"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/gaim is executable by any user" negate="false" test_ref="oval:org.mitre.oval:tst:2739"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1689" version="5" class="vulnerability">
      <metadata>
        <title>Sendmail setjmp longjmp bo (Red Hat Internal)</title>
        <affected family="unix">
          <platform>Red Hat Linux 9</platform>
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <product>Sendmail</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058"/>
        <description>Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.</description>
        <oval_repository>
          <dates>
            <submitted date="2006-03-27T09:51:00.000-04:00">
              <contributor organization="ThreatGuard, Inc.">Robert L. Hollis</contributor>
            </submitted>
            <status_change date="2006-04-06T06:30:00.000-04:00">DRAFT</status_change>
            <status_change date="2006-05-03T10:06:00.000-04:00">INTERIM</status_change>
            <status_change date="2006-05-31T09:45:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected regex in ste:694. Implemented by Jon Baker of The MITRE Corporation." date="2007-05-01T15:07:00.947-04:00">
              <contributor organization="DSCI Contractor">Vladimir Giszpenc</contributor>
            </modified>
            <status_change date="2007-05-01T15:08:55.075-04:00">INTERIM</status_change>
            <status_change date="2007-05-23T15:05:31.387-04:00">ACCEPTED</status_change>
            <modified comment="Corrected vulnerability information for Redhat 3 and Redhat 4" date="2008-01-15T11:57:00-04:00">
              <contributor organization="Secure Elements, Inc.">Sudhir Gandhe</contributor>
            </modified>
            <status_change date="2008-01-17T12:05:31.387-04:00">INTERIM</status_change>
            <status_change date="2008-02-04T04:00:06.233-05:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:ste:694 - I found a few issues (regular expressions), which I've corrected and will detail below." date="2013-04-04T21:53:00.831-04:00">
              <contributor organization="G2, Inc.">Shane Shaffer</contributor>
            </modified>
            <status_change date="2013-04-04T21:54:40.282-04:00">INTERIM</status_change>
            <status_change date="2013-04-22T04:00:13.977-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR" comment="Software section">
        <criteria operator="AND" comment="Sendmail on Redhat 4">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4 for x86" definition_ref="oval:org.mitre.oval:def:1734"/>
          <criterion comment="sendmail version is less than 8.13.1-3" test_ref="oval:org.mitre.oval:tst:7716"/>
        </criteria>
        <criteria operator="AND" comment="Sendmail on Redhat 3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3 for x86" definition_ref="oval:org.mitre.oval:def:5537"/>
          <criterion comment="sendmail version is less than 8.12.11-4" test_ref="oval:org.mitre.oval:tst:7751"/>
        </criteria>
        <criteria operator="AND" comment="Sendmail on other flavors of redhat">
          <extend_definition negate="true" comment="The operating system installed on the system is Red Hat Enterprise Linux 3 for x86" definition_ref="oval:org.mitre.oval:def:5537"/>
          <extend_definition negate="true" comment="The operating system installed on the system is Red Hat Enterprise Linux 4 for x86" definition_ref="oval:org.mitre.oval:def:1734"/>
          <criteria operator="OR" comment="vulnerable version of sendmail">
            <criterion comment="sendmail before 8.12.x is installed" test_ref="oval:org.mitre.oval:tst:774"/>
            <criterion comment="sendmail 8.12.x before 8.12.11 is installed" test_ref="oval:org.mitre.oval:tst:773"/>
            <criterion comment="sendmail 8.13.x before 8.13.6 is installed" test_ref="oval:org.mitre.oval:tst:772"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:5537" version="7" class="inventory">
      <metadata>
        <title>The operating system installed on the system is Red Hat Enterprise Linux 3 for x86</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
        </affected>
        <reference source="CPE" ref_id="cpe:/o:redhat:enterprise_linux:3::ix86"/>
        <description>The operating system installed on the system is Red Hat Enterprise Linux 3 for x86.</description>
        <oval_repository>
          <dates>
            <submitted date="2008-01-12T14:07:00">
              <contributor organization="Secure Elements, Inc.">Sudhir Gandhe</contributor>
            </submitted>
            <status_change date="2008-01-17T13:56:57.725-05:00">DRAFT</status_change>
            <status_change date="2008-02-04T04:00:08.231-05:00">INTERIM</status_change>
            <status_change date="2008-02-25T04:00:11.758-05:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:ste:11298 - Updated CPE reference, updated regular expression" date="2011-02-17T13:32:00.706-05:00">
              <contributor organization="Symantec Corporation">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2011-02-17T13:33:54.429-05:00">INTERIM</status_change>
            <status_change date="2011-03-07T04:00:14.802-05:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:5537 - Modifications vary from minor OVAL title/description changes to suggesting an alternative CPE name to use." date="2011-09-28T11:29:00.976-04:00">
              <contributor organization="The MITRE Corporation">David Rothenberg</contributor>
            </modified>
            <status_change date="2011-09-28T11:33:19.191-04:00">INTERIM</status_change>
            <status_change date="2011-10-17T04:00:19.985-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:ste:11298 - Corrected - right version for brlapi and brlapi-devel as specified by RHSA-2010:0181-5" date="2013-03-18T12:26:00.995-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-03-18T12:31:17.873-04:00">INTERIM</status_change>
            <status_change date="2013-04-08T04:00:47.744-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria>
        <criterion comment="Red Hat Enterprise 3 is installed" test_ref="oval:org.mitre.oval:tst:7836"/>
        <criterion comment="ix86 architecture" test_ref="oval:org.mitre.oval:tst:3912"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1734" version="5" class="inventory">
      <metadata>
        <title>The operating system installed on the system is Red Hat Enterprise Linux 4 for x86</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 4</platform>
        </affected>
        <reference source="CPE" ref_id="cpe:/o:redhat:enterprise_linux:4::ix86"/>
        <description>The operating system installed on the system is Red Hat Enterprise Linux 4 for x86.</description>
        <oval_repository>
          <dates>
            <submitted date="2007-07-27T12:00:00.000-06:00">
              <contributor organization="McAfee, Inc.">Mark Villanova</contributor>
            </submitted>
            <status_change date="2007-08-14T21:26:14.122-04:00">DRAFT</status_change>
            <status_change date="2007-09-06T09:13:28.105-04:00">INTERIM</status_change>
            <status_change date="2007-09-27T08:57:41.206-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:ste:11366 - Updated CPE reference, updated regular expression" date="2011-02-17T13:29:00.547-05:00">
              <contributor organization="Symantec Corporation">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2011-02-17T13:31:08.535-05:00">INTERIM</status_change>
            <status_change date="2011-03-07T04:00:12.614-05:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:ste:11366 - Corrected - right version for brlapi and brlapi-devel as specified by RHSA-2010:0181-5" date="2013-03-18T12:26:00.995-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-03-18T12:31:11.695-04:00">INTERIM</status_change>
            <status_change date="2013-04-08T04:00:43.897-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria>
        <criterion comment="Red Hat Enterprise 4 is installed" test_ref="oval:org.mitre.oval:tst:2652"/>
        <criterion comment="ix86 architecture" test_ref="oval:org.mitre.oval:tst:3912"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:164" version="1" class="vulnerability">
      <metadata>
        <title>Trustix Secure Linux der_chop Script Symlink Attack Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>OpenSSL</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0975"/>
        <description>The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-14T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-15T09:48:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criteria operator="OR" comment="openssl, openssl-devel, OR openssl-perl older than 0.9.7a-33.15 or openssl096b older than 0.9.6b-16.22.3">
            <criterion comment="openssl-perl is older than 0.9.7a-33.15" negate="false" test_ref="oval:org.mitre.oval:tst:2860"/>
            <criterion comment="openssl-devel older than 0.9.7a-33.15" negate="false" test_ref="oval:org.mitre.oval:tst:2859"/>
            <criterion comment="openssl older than 0.9.7a-33.15" negate="false" test_ref="oval:org.mitre.oval:tst:2858"/>
            <criterion comment="openssl096b package is older than 0.9.6b-16.22.3.i386.rpm" negate="false" test_ref="oval:org.mitre.oval:tst:2857"/>
          </criteria>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/tmp is writable by everyone" negate="false" test_ref="oval:org.mitre.oval:tst:2856"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1348" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 XBL Script Security Bypass Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2261"/>
        <description>Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.1.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:2482"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1347" version="3" class="vulnerability">
      <metadata>
        <title>FreeRADIUS Ascend-Send-Secret Server Crash</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>FreeRADIUS</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0938"/>
        <description>FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2004-11-22T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-01-12T12:41:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-02-02T12:00:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-02-23T09:25:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Updated inetlisteningservers_objects to match Schematron rules.  Set the local_port entities to be datatype, 'int'." date="2010-09-02T20:49:00.853-04:00">
              <contributor organization="The MITRE Corporation">Jonathan Baker</contributor>
            </modified>
            <status_change date="2010-09-02T20:54:56.468-04:00">INTERIM</status_change>
            <status_change date="2010-09-20T04:00:11.346-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="FreeRADIUS rpm older than 1.0.1-1" negate="false" test_ref="oval:org.mitre.oval:tst:974"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="radiusd is listening on the network" negate="false" test_ref="oval:org.mitre.oval:tst:973"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1281" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 Firefox InstallTrigger Callback Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2263"/>
        <description>The InstallTrigger.install method in Firefox before 1.0.5 and Mozilla before 1.7.9 allows remote attackers to execute a callback function in the context of another domain by forcing a page navigation after the install method has been called, which causes the callback to be run in the context of the new page and results in a same origin violation.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.1.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:2482"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1268" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 Firefox and Mozilla Javascript Dialog Box Spoofing</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2268"/>
        <description>Firefox before 1.0.5 and Mozilla before 1.7.9 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.1.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:2482"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1260" version="1" class="vulnerability">
      <metadata>
        <title>Integer Overflow in libgd2</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>libgd</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990"/>
        <description>Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-27T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-29T06:49:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criteria operator="AND" comment="libgd or libgd-devel RPM is earlier than 0:1.8.4-12.3.1">
          <criterion comment="libgd RPM is earlier than 0:1.8.4-12.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:1085"/>
          <criterion comment="libgd-devel RPM is earlier than 0:1.8.4-12.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:1084"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1258" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 Firefox and Mozilla DOM Node Spoofing</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2269"/>
        <description>Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties ("XHTML node spoofing").</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.1.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:2482"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1245" version="2" class="vulnerability">
      <metadata>
        <title>gedit Format String Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>gedit</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1686"/>
        <description>Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename.  NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-11T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
            <modified comment="Corrected version string in ste:929. Implemented by Jon Baker of The MITRE Corporation." date="2007-01-12T13:34:00.798-05:00">
              <contributor organization="Independent Contributor">Bob Towbes</contributor>
            </modified>
            <status_change date="2007-01-12T13:37:39.951-05:00">INTERIM</status_change>
            <status_change date="2007-02-20T13:39:37.408-05:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="gedit RPM earlier than 1:2.2.2-4rhel3" negate="false" test_ref="oval:org.mitre.oval:tst:1042"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/gedit is executable" negate="false" test_ref="oval:org.mitre.oval:tst:1041"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1242" version="1" class="vulnerability">
      <metadata>
        <title>sudo Symlink Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>sudo</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1993"/>
        <description>Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-18T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <notes>
        <note>It appears that we can't parse the vulnerable configuration condition (an ALL in the second field of a line after a line that has no ALL in the second field) with our existing regexp.</note>
      </notes>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="sudo RPM earlier than 0:1.6.7p5-1.1" negate="false" test_ref="oval:org.mitre.oval:tst:1046"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/etc/sudoers exists" negate="false" test_ref="oval:org.mitre.oval:tst:1045"/>
          <criterion comment="/usr/bin/sudo is executable by everyone" negate="false" test_ref="oval:org.mitre.oval:tst:1044"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1225" version="1" class="vulnerability">
      <metadata>
        <title>Linux Kernel shmctl() Memory Swap Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Linux kernel</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0176"/>
        <description>The shmctl function in Linux 2.6.9 and earlier allows local users to unlock the memory of other processes, which could cause sensitive memory to be swapped to disk, which could allow it to be read by other users once it has been released.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-29T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-29T06:49:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criteria operator="OR" comment="kernel, kernel-smp or kernel-hugemem RPM earlier than 0:2.4.21-32.0.1.EL">
          <criterion comment="kernel RPM earlier than 0:2.4.21-32.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1148"/>
          <criterion comment="kernel-hugemem RPM earlier than 0:2.4.21-32.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1147"/>
          <criterion comment="kernel-smp RPM earlier than 0:2.4.21-32.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1146"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1195" version="1" class="vulnerability">
      <metadata>
        <title>Multiple Buffer Overflows in libgd</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>libgd</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941"/>
        <description>Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabilities than CVE-2004-0990.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-27T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-29T06:49:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criteria operator="AND" comment="libgd or libgd-devel RPM is earlier than 0:1.8.4-12.3.1">
          <criterion comment="libgd RPM is earlier than 0:1.8.4-12.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:1085"/>
          <criterion comment="libgd-devel RPM is earlier than 0:1.8.4-12.3.1" negate="false" test_ref="oval:org.mitre.oval:tst:1084"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11911" version="5" class="vulnerability">
      <metadata>
        <title>The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1189"/>
        <description>The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:21.594-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:47.293-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:42.258-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11911 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:06.185-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:16:03.095-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-38" test_ref="oval:org.mitre.oval:tst:31249"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-38" test_ref="oval:org.mitre.oval:tst:31238"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-38" test_ref="oval:org.mitre.oval:tst:30907"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-38" test_ref="oval:org.mitre.oval:tst:30640"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-38" test_ref="oval:org.mitre.oval:tst:30935"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-10" test_ref="oval:org.mitre.oval:tst:30987"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-10" test_ref="oval:org.mitre.oval:tst:31115"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-10" test_ref="oval:org.mitre.oval:tst:31053"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-10" test_ref="oval:org.mitre.oval:tst:31212"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-10" test_ref="oval:org.mitre.oval:tst:31085"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11892" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179"/>
        <description>Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:08.382-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:46.642-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:41.612-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11892 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:44.859-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:16:02.186-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 1:2.02-14.el3" test_ref="oval:org.mitre.oval:tst:38322"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38126"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38230"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38481"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_7.4" test_ref="oval:org.mitre.oval:tst:38436"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38145"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="xpdf is earlier than 1:3.00-20.el4" test_ref="oval:org.mitre.oval:tst:38649"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38607"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38618"/>
            <criterion comment="cups-lpd is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38471"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40312"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38271"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38760"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40122"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38541"/>
            <criterion comment="tetex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40413"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40398"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38500"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40444"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38512"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:37935"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40008"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:39920"/>
            <criterion comment="cups is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38334"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11881" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511"/>
        <description>Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:16.954-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:45.975-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:40.940-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11881 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:39.676-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:16:01.257-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38137"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37886"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37999"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37907"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37709"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38092"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37745"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38039"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38062"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38073"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37574"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38071"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37857"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-18.el4" test_ref="oval:org.mitre.oval:tst:37200"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37812"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el4" test_ref="oval:org.mitre.oval:tst:38080"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37139"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37869"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37789"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37395"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38118"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:38072"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38037"/>
            <criterion comment="nspr is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37420"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37854"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.19-1.el5_2" test_ref="oval:org.mitre.oval:tst:38053"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37419"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38083"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:37631"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38114"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37737"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37403"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11864" version="5" class="vulnerability">
      <metadata>
        <title>The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0751"/>
        <description>The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:02.499-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:45.087-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:39.836-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11864 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:39.655-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:16:00.602-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30894"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30928"/>
          <criterion comment="httpd is earlier than 0:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30979"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11852" version="5" class="vulnerability">
      <metadata>
        <title>The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083"/>
        <description>The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:05.090-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:43.788-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:37.533-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11852 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:18.376-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:58.266-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="pidgin is earlier than 0:1.5.1-6.el3" test_ref="oval:org.mitre.oval:tst:39353"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="finch-devel is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39474"/>
            <criterion comment="libpurple is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39423"/>
            <criterion comment="libpurple-perl is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39307"/>
            <criterion comment="libpurple-tcl is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39264"/>
            <criterion comment="pidgin-devel is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39332"/>
            <criterion comment="libpurple-devel is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39395"/>
            <criterion comment="finch is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39376"/>
            <criterion comment="pidgin-perl is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39381"/>
            <criterion comment="pidgin is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39450"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="finch-devel is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39246"/>
            <criterion comment="libpurple is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39428"/>
            <criterion comment="libpurple-perl is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39414"/>
            <criterion comment="libpurple-tcl is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39006"/>
            <criterion comment="pidgin-devel is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:38683"/>
            <criterion comment="libpurple-devel is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39404"/>
            <criterion comment="finch is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39139"/>
            <criterion comment="pidgin-perl is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39341"/>
            <criterion comment="pidgin is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39169"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11843" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375"/>
        <description>Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:02.655-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:42.753-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:35.774-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11843 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:19.073-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:56.709-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35915"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35794"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36513"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36264"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36161"/>
            <criterion comment="kernel is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36518"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36597"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36612"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36171"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36201"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36534"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36373"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36702"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36615"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36490"/>
            <criterion comment="kernel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36370"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:35738"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36249"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:36731"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-67.0.15.EL" test_ref="oval:org.mitre.oval:tst:35733"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36107"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36600"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36529"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36526"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36442"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36238"/>
            <criterion comment="kernel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36463"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36480"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:35876"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36532"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36278"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:35724"/>
            <criterion comment="kernel-debuginfo-common is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36560"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11840" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794"/>
        <description>Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:59.347-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:42.438-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:35.437-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11840 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:16.815-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:56.162-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssh is earlier than 0:3.6.1p2-33.30.13" test_ref="oval:org.mitre.oval:tst:33000"/>
            <criterion comment="openssh-askpass is earlier than 0:3.6.1p2-33.30.13" test_ref="oval:org.mitre.oval:tst:33245"/>
            <criterion comment="openssh-server is earlier than 0:3.6.1p2-33.30.13" test_ref="oval:org.mitre.oval:tst:33139"/>
            <criterion comment="openssh-clients is earlier than 0:3.6.1p2-33.30.13" test_ref="oval:org.mitre.oval:tst:33141"/>
            <criterion comment="openssh-askpass-gnome is earlier than 0:3.6.1p2-33.30.13" test_ref="oval:org.mitre.oval:tst:32291"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssh is earlier than 0:3.9p1-8.RHEL4.17.1" test_ref="oval:org.mitre.oval:tst:33097"/>
            <criterion comment="openssh-askpass is earlier than 0:3.9p1-8.RHEL4.17.1" test_ref="oval:org.mitre.oval:tst:32553"/>
            <criterion comment="openssh-server is earlier than 0:3.9p1-8.RHEL4.17.1" test_ref="oval:org.mitre.oval:tst:33044"/>
            <criterion comment="openssh-clients is earlier than 0:3.9p1-8.RHEL4.17.1" test_ref="oval:org.mitre.oval:tst:33197"/>
            <criterion comment="openssh-askpass-gnome is earlier than 0:3.9p1-8.RHEL4.17.1" test_ref="oval:org.mitre.oval:tst:33036"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11816" version="5" class="vulnerability">
      <metadata>
        <title>The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1016"/>
        <description>The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:19.090-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:41.646-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:33.565-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11816 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:08.255-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:55.198-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:31101"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30944"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30205"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30752"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30999"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30940"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:31177"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30903"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30786"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11810" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of JavaScript into documents within a JAR archive or (2) a JAR archive that uses relative URLs to JavaScript files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801"/>
        <description>Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of JavaScript into documents within a JAR archive or (2) a JAR archive that uses relative URLs to JavaScript files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:59.614-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:40.427-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:32.316-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11810 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:43.623-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:54.309-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37286"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37033"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37126"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37105"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37271"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37279"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37060"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37189"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36476"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36916"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37192"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-14.el4" test_ref="oval:org.mitre.oval:tst:36999"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36886"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37331"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36365"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.19.el4" test_ref="oval:org.mitre.oval:tst:37174"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37226"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36766"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36826"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37274"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37107"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:37351"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.16-1.el5" test_ref="oval:org.mitre.oval:tst:37363"/>
            <criterion comment="xulrunner is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36984"/>
            <criterion comment="devhelp is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37234"/>
            <criterion comment="yelp is earlier than 0:2.16.0-19.el5" test_ref="oval:org.mitre.oval:tst:37291"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36436"/>
            <criterion comment="firefox is earlier than 0:3.0-2.el5" test_ref="oval:org.mitre.oval:tst:36814"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11808" version="5" class="vulnerability">
      <metadata>
        <title>The JavaScript engine in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly handle temporary variables that are not garbage collected, which might allow remote attackers to trigger operations on freed memory and cause memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742"/>
        <description>The JavaScript engine in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly handle temporary variables that are not garbage collected, which might allow remote attackers to trigger operations on freed memory and cause memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:41.602-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:39.895-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:31.772-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11808 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:24.003-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:51.552-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11807" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in the (1) recognize_eps_file function (src/psgen.c) and (2) tilde_subst function (src/util.c) in GNU enscript 1.6.1, and possibly earlier, might allow remote attackers to execute arbitrary code via an epsf escape sequence with a long filename.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5078"/>
        <description>Multiple buffer overflows in the (1) recognize_eps_file function (src/psgen.c) and (2) tilde_subst function (src/util.c) in GNU enscript 1.6.1, and possibly earlier, might allow remote attackers to execute arbitrary code via an epsf escape sequence with a long filename.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:33.632-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:39.676-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:31.541-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11807 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:09.657-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:50.367-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="enscript is earlier than 0:1.6.1-24.7" test_ref="oval:org.mitre.oval:tst:37704"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="enscript is earlier than 0:1.6.1-33.el4_7.1" test_ref="oval:org.mitre.oval:tst:37804"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11804" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unknown vulnerabilities in the (1) TZSP, (2) MGCP, (3) ISUP, (4) SMB, or (5) Bittorrent dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (segmentation fault) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1470"/>
        <description>Multiple unknown vulnerabilities in the (1) TZSP, (2) MGCP, (3) ISUP, (4) SMB, or (5) Bittorrent dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (segmentation fault) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:47.280-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:39.171-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:30.971-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11804 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:43.007-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:49.503-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11803" version="5" class="vulnerability">
      <metadata>
        <title>The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296"/>
        <description>The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:42.017-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:38.670-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:30.499-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11803 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:46.954-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:48.831-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32492"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32486"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32176"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31856"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32548"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31980"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32519"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32478"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31709"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31881"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32504"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32502"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:31570"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:31656"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32458"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32216"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32359"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32540"/>
            <criterion comment="firefox is earlier than 0:1.0.7-1.4.3" test_ref="oval:org.mitre.oval:tst:32384"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32647"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32454"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11801" version="5" class="vulnerability">
      <metadata>
        <title>The SSCOP dissector in Wireshark (formerly Ethereal) before 0.99.3 allows remote attackers to cause a denial of service (resource consumption) via malformed packets that cause the Q.2391 dissector to use excessive memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4333"/>
        <description>The SSCOP dissector in Wireshark (formerly Ethereal) before 0.99.3 allows remote attackers to cause a denial of service (resource consumption) via malformed packets that cause the Q.2391 dissector to use excessive memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:27.288-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:38.425-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:30.244-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11801 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:15.851-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:48.444-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.3-EL3.2" test_ref="oval:org.mitre.oval:tst:33011"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.3-EL3.2" test_ref="oval:org.mitre.oval:tst:32323"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.3-EL4.2" test_ref="oval:org.mitre.oval:tst:33025"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.3-EL4.2" test_ref="oval:org.mitre.oval:tst:32974"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11796" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0688"/>
        <description>Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:34.905-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:37.774-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:29.429-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11796 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:04.289-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:47.744-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30914"/>
          <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30029"/>
          <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30748"/>
          <criterion comment="XFree86-libs is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30779"/>
          <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30003"/>
          <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30783"/>
          <criterion comment="XFree86-twm is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30052"/>
          <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30925"/>
          <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:31001"/>
          <criterion comment="XFree86-doc is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30889"/>
          <criterion comment="openmotif21 is earlier than 0:2.1.30-9.RHEL3.4" test_ref="oval:org.mitre.oval:tst:30867"/>
          <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30841"/>
          <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30838"/>
          <criterion comment="openmotif is earlier than 0:2.2.3-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:31105"/>
          <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30875"/>
          <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30347"/>
          <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30599"/>
          <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30544"/>
          <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30612"/>
          <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30933"/>
          <criterion comment="XFree86-xdm is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30902"/>
          <criterion comment="XFree86-sdk is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30619"/>
          <criterion comment="XFree86 is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30899"/>
          <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30943"/>
          <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30747"/>
          <criterion comment="XFree86-xfs is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30145"/>
          <criterion comment="XFree86-tools is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30701"/>
          <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30805"/>
          <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30951"/>
          <criterion comment="openmotif-devel is earlier than 0:2.2.3-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:30744"/>
          <criterion comment="XFree86-xauth is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30843"/>
          <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30963"/>
          <criterion comment="XFree86-devel is earlier than 0:4.3.0-69.EL" test_ref="oval:org.mitre.oval:tst:30677"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11790" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0891"/>
        <description>Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:20.623-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:37.588-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:29.237-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11790 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:27.758-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:47.477-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="gaim is earlier than 1:1.0.1-1.RHEL3" test_ref="oval:org.mitre.oval:tst:30983"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11788" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236"/>
        <description>Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:36.009-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:37.072-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:28.179-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11788 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:29.876-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:46.165-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36547"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36570"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36574"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35661"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36605"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35672"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35874"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36533"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36355"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36379"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36587"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:35752"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-10.el4" test_ref="oval:org.mitre.oval:tst:36259"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36586"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36333"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36500"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.14.el4" test_ref="oval:org.mitre.oval:tst:35884"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36540"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36602"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36557"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36221"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36566"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36305"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-11.el5_1" test_ref="oval:org.mitre.oval:tst:36619"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11781" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0064"/>
        <description>Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:20.538-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:35.826-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:26.560-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11781 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:18.336-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:44.748-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.24" test_ref="oval:org.mitre.oval:tst:31296"/>
            <criterion comment="xpdf is earlier than 1:2.02-9.5" test_ref="oval:org.mitre.oval:tst:30886"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.24" test_ref="oval:org.mitre.oval:tst:31027"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.24" test_ref="oval:org.mitre.oval:tst:31314"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.EL4.4" test_ref="oval:org.mitre.oval:tst:31002"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-3.3" test_ref="oval:org.mitre.oval:tst:31263"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.EL4.4" test_ref="oval:org.mitre.oval:tst:31187"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-3.3" test_ref="oval:org.mitre.oval:tst:31323"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.EL4.4" test_ref="oval:org.mitre.oval:tst:31257"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:31093"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.EL4.4" test_ref="oval:org.mitre.oval:tst:30716"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-4.3" test_ref="oval:org.mitre.oval:tst:30790"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:30919"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.EL4.4" test_ref="oval:org.mitre.oval:tst:31111"/>
            <criterion comment="xpdf is earlier than 1:3.00-11.5" test_ref="oval:org.mitre.oval:tst:30331"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.EL4.4" test_ref="oval:org.mitre.oval:tst:30846"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.EL4.4" test_ref="oval:org.mitre.oval:tst:31305"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:31056"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11776" version="5" class="vulnerability">
      <metadata>
        <title>Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1007"/>
        <description>Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:52.633-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:35.330-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:26.044-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11776 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:14.654-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:42.704-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gnomemeeting is earlier than 0:0.96.0-5" test_ref="oval:org.mitre.oval:tst:32840"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gnomemeeting is earlier than 0:1.0.2-9" test_ref="oval:org.mitre.oval:tst:33628"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11772" version="5" class="vulnerability">
      <metadata>
        <title>Firefox 1.0 allows remote attackers to execute arbitrary code via plugins that load "privileged content" into frames, as demonstrated using certain XUL events when a user drags a scrollbar two times, aka "Firescrolling."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0527"/>
        <description>Firefox 1.0 allows remote attackers to execute arbitrary code via plugins that load "privileged content" into frames, as demonstrated using certain XUL events when a user drags a scrollbar two times, aka "Firescrolling."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:33.376-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:34.941-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:25.354-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11772 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:08.012-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:40.769-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="firefox is earlier than 0:1.0.1-1.4.3" test_ref="oval:org.mitre.oval:tst:31118"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11760" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529"/>
        <description>Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:30.537-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:34.347-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:24.342-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11760 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:28.521-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:39.568-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.5.10-13" test_ref="oval:org.mitre.oval:tst:36760"/>
            <criterion comment="libxml2-python is earlier than 0:2.5.10-13" test_ref="oval:org.mitre.oval:tst:37705"/>
            <criterion comment="libxml2 is earlier than 0:2.5.10-13" test_ref="oval:org.mitre.oval:tst:37156"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.16-12.5" test_ref="oval:org.mitre.oval:tst:37713"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.16-12.5" test_ref="oval:org.mitre.oval:tst:37446"/>
            <criterion comment="libxml2 is earlier than 0:2.6.16-12.5" test_ref="oval:org.mitre.oval:tst:37341"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.26-2.1.2.6" test_ref="oval:org.mitre.oval:tst:36730"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.26-2.1.2.6" test_ref="oval:org.mitre.oval:tst:37719"/>
            <criterion comment="libxml2 is earlier than 0:2.6.26-2.1.2.6" test_ref="oval:org.mitre.oval:tst:37620"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11755" version="5" class="vulnerability">
      <metadata>
        <title>OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0081"/>
        <description>OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:29.408-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:34.128-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:24.101-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11755 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:04:14.083-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:39.270-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.4" test_ref="oval:org.mitre.oval:tst:30638"/>
          <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.4" test_ref="oval:org.mitre.oval:tst:30381"/>
          <criterion comment="openssl is earlier than 0:0.9.7a-33.4" test_ref="oval:org.mitre.oval:tst:30673"/>
          <criterion comment="openssl096b is earlier than 0:0.9.6b-16" test_ref="oval:org.mitre.oval:tst:30479"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11754" version="5" class="vulnerability">
      <metadata>
        <title>The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428"/>
        <description>The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:33.811-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:33.007-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:23.152-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11754 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:12.235-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:38.122-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35923"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35665"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36014"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35929"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36011"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35836"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35726"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35715"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35610"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36025"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35789"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35804"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35865"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35793"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35903"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35965"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35922"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35504"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35045"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35914"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35831"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35998"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35975"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36031"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35971"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35711"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35933"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35826"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35753"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35678"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35795"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35934"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35467"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35946"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36116"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35116"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36004"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35483"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36103"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36060"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36074"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35895"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35905"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36012"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35984"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35857"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35681"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35909"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-server-sdk is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35517"/>
            <criterion comment="xorg-x11-server-Xnest is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35690"/>
            <criterion comment="xorg-x11-server-Xvfb is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35399"/>
            <criterion comment="xorg-x11-server-Xdmx is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35908"/>
            <criterion comment="xorg-x11-server-Xephyr is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35987"/>
            <criterion comment="xorg-x11-server is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35861"/>
            <criterion comment="xorg-x11-server-Xorg is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35935"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11751" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.5 and Mozilla before 1.7.9 does not properly clone base objects, which allows remote attackers to execute arbitrary code by navigating the prototype chain to reach a privileged object.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2270"/>
        <description>Firefox before 1.0.5 and Mozilla before 1.7.9 does not properly clone base objects, which allows remote attackers to execute arbitrary code by navigating the prototype chain to reach a privileged object.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:39.093-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:32.241-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:22.313-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11751 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:19.395-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:36.855-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32142"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32131"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32154"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32001"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32171"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32162"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31782"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32041"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32004"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31353"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32120"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31633"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31837"/>
            <criterion comment="thunderbird is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32113"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32100"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31821"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31904"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31814"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31951"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31554"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32149"/>
            <criterion comment="firefox is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32167"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31998"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32061"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11749" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.5 allows remote attackers to inject arbitrary web script "into another site's context" via a "timing issue" involving the (1) addEventListener or (2) setTimeout function, probably by setting events that activate after the context has changed.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736"/>
        <description>Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.5 allows remote attackers to inject arbitrary web script "into another site's context" via a "timing issue" involving the (1) addEventListener or (2) setTimeout function, probably by setting events that activate after the context has changed.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:38.269-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:31.669-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:21.731-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11749 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:37.221-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:35.807-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:33986"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34827"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34839"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34762"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34814"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34694"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34925"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34723"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34747"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34968"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34971"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.3.el4" test_ref="oval:org.mitre.oval:tst:34888"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34868"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34492"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34775"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.3.el4" test_ref="oval:org.mitre.oval:tst:34828"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34981"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34335"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34957"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34608"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34810"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34667"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34869"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11732" version="5" class="vulnerability">
      <metadata>
        <title>The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows remote attackers to cause a denial of service (service hang) via a certain UDP packet to the IPP port.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0558"/>
        <description>The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows remote attackers to cause a denial of service (service hang) via a certain UDP packet to the IPP port.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:46.682-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:30.319-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:20.358-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11732 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:47.239-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:33.804-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.13" test_ref="oval:org.mitre.oval:tst:30809"/>
          <criterion comment="cups is earlier than 1:1.1.17-13.3.13" test_ref="oval:org.mitre.oval:tst:30723"/>
          <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.13" test_ref="oval:org.mitre.oval:tst:29988"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1173" version="1" class="vulnerability">
      <metadata>
        <title>Multiple Buffer Overflows in libXML2</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>libxml2</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0989"/>
        <description>Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-27T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-29T06:49:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criteria operator="OR" comment="libxml or libxml-devel RPM is earlier than 1:1.8.17-9.2">
          <criterion comment="libxml RPM is earlier than 1:1.8.17-9.2" negate="false" test_ref="oval:org.mitre.oval:tst:1102"/>
          <criterion comment="libxml-devel RPM is earlier than 1:1.8.17-9.2" negate="false" test_ref="oval:org.mitre.oval:tst:1101"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11728" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571"/>
        <description>Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:00.202-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:29.793-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:19.242-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11728 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:06.383-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:33.174-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32759"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32989"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32809"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32779"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32954"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32668"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33010"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32811"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32981"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33061"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:32072"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33120"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32910"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32677"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32933"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32243"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:33062"/>
            <criterion comment="firefox is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32951"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32978"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33072"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33079"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32121"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33077"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11724" version="5" class="vulnerability">
      <metadata>
        <title>Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257"/>
        <description>Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:22.437-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:29.504-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:18.907-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11724 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:03.916-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:32.632-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution is earlier than 0:1.4.5-21.el3" test_ref="oval:org.mitre.oval:tst:33987"/>
            <criterion comment="evolution-devel is earlier than 0:1.4.5-21.el3" test_ref="oval:org.mitre.oval:tst:34669"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution is earlier than 0:2.0.2-35.0.4.el4" test_ref="oval:org.mitre.oval:tst:34459"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-35.0.4.el4" test_ref="oval:org.mitre.oval:tst:33713"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution-data-server-devel is earlier than 0:1.8.0-15.0.4.el5" test_ref="oval:org.mitre.oval:tst:34172"/>
            <criterion comment="evolution-data-server is earlier than 0:1.8.0-15.0.4.el5" test_ref="oval:org.mitre.oval:tst:34388"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11723" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274"/>
        <description>Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:50.987-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:29.119-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:18.510-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11723 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:29.978-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:32.104-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31896"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31885"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31861"/>
            <criterion comment="kernel is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31550"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31914"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31924"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:32023"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11722" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1772"/>
        <description>Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:32.247-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:28.842-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:18.280-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11722 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:00.847-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:31.675-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="sharutils is earlier than 0:4.2.1-16.2" test_ref="oval:org.mitre.oval:tst:31587"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="sharutils is earlier than 0:4.2.1-22.2" test_ref="oval:org.mitre.oval:tst:31528"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1172" version="1" class="vulnerability">
      <metadata>
        <title>RHE3 Firefox External App Code Acceptance Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>mozilla</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2267"/>
        <description>Firefox before 1.0.5 allows remote attackers to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL, which is run in the context of the previous page, and may lead to code execution if the standalone application loads a privileged chrome: URL.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-08-15T04:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-08-19T10:05:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-10-12T05:49:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2483"/>
          <criterion comment="mozilla RPM is earlier than 37:1.7.10-1.4.1" negate="false" test_ref="oval:org.mitre.oval:tst:2651"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/mozilla is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2650"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11719" version="5" class="vulnerability">
      <metadata>
        <title>The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0750"/>
        <description>The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:55.823-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:27.933-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:17.175-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11719 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:39.875-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:29.557-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31148"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31473"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31178"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31282"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31565"/>
            <criterion comment="kernel is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31562"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31582"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:30730"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31534"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31545"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31539"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31661"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31482"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31112"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31605"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.5.EL" test_ref="oval:org.mitre.oval:tst:31330"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11716" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052"/>
        <description>Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:44.203-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:26.783-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:15.956-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11716 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:38.073-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:27.797-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.2.3-6.8" test_ref="oval:org.mitre.oval:tst:35717"/>
            <criterion comment="tkinter is earlier than 0:2.2.3-6.8" test_ref="oval:org.mitre.oval:tst:35704"/>
            <criterion comment="python-tools is earlier than 0:2.2.3-6.8" test_ref="oval:org.mitre.oval:tst:35616"/>
            <criterion comment="python is earlier than 0:2.2.3-6.8" test_ref="oval:org.mitre.oval:tst:35688"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.3.4-14.4.el4_6.1" test_ref="oval:org.mitre.oval:tst:35282"/>
            <criterion comment="tkinter is earlier than 0:2.3.4-14.4.el4_6.1" test_ref="oval:org.mitre.oval:tst:35468"/>
            <criterion comment="python-tools is earlier than 0:2.3.4-14.4.el4_6.1" test_ref="oval:org.mitre.oval:tst:35783"/>
            <criterion comment="python is earlier than 0:2.3.4-14.4.el4_6.1" test_ref="oval:org.mitre.oval:tst:35573"/>
            <criterion comment="python-docs is earlier than 0:2.3.4-14.4.el4_6.1" test_ref="oval:org.mitre.oval:tst:35259"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38889"/>
            <criterion comment="tkinter is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38958"/>
            <criterion comment="python-tools is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38827"/>
            <criterion comment="python is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38282"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11712" version="5" class="vulnerability">
      <metadata>
        <title>Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1262"/>
        <description>Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:04.112-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:26.242-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:14.989-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11712 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:03.817-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:27.341-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-6.el3" test_ref="oval:org.mitre.oval:tst:33850"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-4.0.1.el4" test_ref="oval:org.mitre.oval:tst:33871"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-4.0.1.el5" test_ref="oval:org.mitre.oval:tst:34227"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11711" version="5" class="vulnerability">
      <metadata>
        <title>Vulnerability in tif_dirread.c for libtiff allows remote attackers to cause a denial of service (application crash) via a TIFF image that causes a divide-by-zero error when the number of row bytes is zero, a different vulnerability than CVE-2005-2452.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0804"/>
        <description>Vulnerability in tif_dirread.c for libtiff allows remote attackers to cause a denial of service (application crash) via a TIFF image that causes a divide-by-zero error when the number of row bytes is zero, a different vulnerability than CVE-2005-2452.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:51.743-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:25.899-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:14.689-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11711 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:25.664-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:26.905-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="tetex-latex is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31559"/>
          <criterion comment="kdegraphics-devel is earlier than 7:3.1.3-3.7" test_ref="oval:org.mitre.oval:tst:30890"/>
          <criterion comment="libtiff is earlier than 0:3.5.7-20.1" test_ref="oval:org.mitre.oval:tst:31042"/>
          <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31693"/>
          <criterion comment="kdegraphics is earlier than 7:3.1.3-3.7" test_ref="oval:org.mitre.oval:tst:31096"/>
          <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31615"/>
          <criterion comment="tetex is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31603"/>
          <criterion comment="libtiff-devel is earlier than 0:3.5.7-20.1" test_ref="oval:org.mitre.oval:tst:31022"/>
          <criterion comment="tetex-afm is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31685"/>
          <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.7" test_ref="oval:org.mitre.oval:tst:31747"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11710" version="5" class="vulnerability">
      <metadata>
        <title>The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0421"/>
        <description>The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:53.403-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:25.682-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:14.461-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11710 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:30.189-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:26.599-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="libpng10-devel is earlier than 0:1.0.13-12" test_ref="oval:org.mitre.oval:tst:30075"/>
          <criterion comment="libpng-devel is earlier than 2:1.2.2-21" test_ref="oval:org.mitre.oval:tst:30629"/>
          <criterion comment="libpng is earlier than 2:1.2.2-21" test_ref="oval:org.mitre.oval:tst:30587"/>
          <criterion comment="libpng10 is earlier than 0:1.0.13-12" test_ref="oval:org.mitre.oval:tst:30412"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11706" version="5" class="vulnerability">
      <metadata>
        <title>The find_replen function in jsstr.c in the Javascript engine for Mozilla Suite 1.7.6, Firefox 1.0.1 and 1.0.2, and Netscape 7.2 allows remote attackers to read portions of heap memory in a Javascript string via the lambda replace method.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0989"/>
        <description>The find_replen function in jsstr.c in the Javascript engine for Mozilla Suite 1.7.6, Firefox 1.0.1 and 1.0.2, and Netscape 7.2 allows remote attackers to read portions of heap memory in a Javascript string via the lambda replace method.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:24.357-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:24.863-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:13.621-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11706 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:16.248-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:25.392-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31478"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31488"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31751"/>
            <criterion comment="thunderbird is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32113"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31647"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30850"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31749"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31658"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31636"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31780"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30828"/>
            <criterion comment="firefox is earlier than 0:1.0.3-1.4.1" test_ref="oval:org.mitre.oval:tst:31646"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31716"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31758"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11704" version="5" class="vulnerability">
      <metadata>
        <title>nsHTMLContentSink.cpp in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors involving a "particular sequence of HTML tags" that leads to memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749"/>
        <description>nsHTMLContentSink.cpp in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors involving a "particular sequence of HTML tags" that leads to memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:00.640-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:24.375-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:13.123-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11704 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:18.322-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:24.719-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11703" version="5" class="vulnerability">
      <metadata>
        <title>The php_next_marker function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a JPEG image with an invalid marker value, which causes a negative length value to be passed to php_stream_seek.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0525"/>
        <description>The php_next_marker function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a JPEG image with an invalid marker value, which causes a negative length value to be passed to php_stream_seek.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:18.413-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:23.888-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:12.570-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11703 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:20.153-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:24.134-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31759"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:30948"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31858"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31704"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31679"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31505"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-23.ent" test_ref="oval:org.mitre.oval:tst:31819"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31329"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31673"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31737"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31787"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31830"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31383"/>
            <criterion comment="php is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31557"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31541"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31697"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31847"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31523"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31779"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31261"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.6" test_ref="oval:org.mitre.oval:tst:31733"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11695" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.4.3 and Adium before 1.3 allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, a different vulnerability than CVE-2008-2955.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927"/>
        <description>Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.4.3 and Adium before 1.3 allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, a different vulnerability than CVE-2008-2955.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:18.742-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:21.479-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:10.284-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11695 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:14:13.574-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:22.620-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="pidgin is earlier than 0:1.5.1-2.el3" test_ref="oval:org.mitre.oval:tst:36472"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="pidgin is earlier than 0:1.5.1-2.el4" test_ref="oval:org.mitre.oval:tst:37369"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="finch-devel is earlier than 0:2.3.1-2.el5_2" test_ref="oval:org.mitre.oval:tst:37440"/>
            <criterion comment="libpurple is earlier than 0:2.3.1-2.el5_2" test_ref="oval:org.mitre.oval:tst:36524"/>
            <criterion comment="libpurple-perl is earlier than 0:2.3.1-2.el5_2" test_ref="oval:org.mitre.oval:tst:37413"/>
            <criterion comment="libpurple-tcl is earlier than 0:2.3.1-2.el5_2" test_ref="oval:org.mitre.oval:tst:36776"/>
            <criterion comment="pidgin-devel is earlier than 0:2.3.1-2.el5_2" test_ref="oval:org.mitre.oval:tst:37512"/>
            <criterion comment="libpurple-devel is earlier than 0:2.3.1-2.el5_2" test_ref="oval:org.mitre.oval:tst:37332"/>
            <criterion comment="finch is earlier than 0:2.3.1-2.el5_2" test_ref="oval:org.mitre.oval:tst:37243"/>
            <criterion comment="pidgin-perl is earlier than 0:2.3.1-2.el5_2" test_ref="oval:org.mitre.oval:tst:37347"/>
            <criterion comment="pidgin is earlier than 0:2.3.1-2.el5_2" test_ref="oval:org.mitre.oval:tst:37098"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11692" version="5" class="vulnerability">
      <metadata>
        <title>ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a crafted font file that triggers a null dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661"/>
        <description>ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a crafted font file that triggers a null dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:14.117-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:21.207-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:09.540-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11692 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:14:00.828-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:22.215-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.4-4.0.rhel3.2" test_ref="oval:org.mitre.oval:tst:32599"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.4-4.0.rhel3.2" test_ref="oval:org.mitre.oval:tst:32616"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.9-1.rhel4.4" test_ref="oval:org.mitre.oval:tst:32106"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.9-1.rhel4.4" test_ref="oval:org.mitre.oval:tst:32605"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.9-1.rhel4.4" test_ref="oval:org.mitre.oval:tst:32417"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.9-1.rhel4.4" test_ref="oval:org.mitre.oval:tst:32653"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11691" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in the layout engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497"/>
        <description>Multiple unspecified vulnerabilities in the layout engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:27.600-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:20.693-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:08.990-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11691 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:37.000-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:21.560-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32785"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33227"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33266"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33146"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32352"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33183"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33095"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33300"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32996"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33263"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33195"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33229"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32844"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33273"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33259"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33239"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33284"/>
            <criterion comment="firefox is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32815"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33153"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33015"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33251"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33336"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32408"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11690" version="5" class="vulnerability">
      <metadata>
        <title>The coda_pioctl function in the coda functionality (pioctl.c) for Linux kernel 2.6.9 and 2.4.x before 2.4.29 may allow local users to cause a denial of service (crash) or execute arbitrary code via negative vi.in_size or vi.out_size values, which may trigger a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0124"/>
        <description>The coda_pioctl function in the coda functionality (pioctl.c) for Linux kernel 2.6.9 and 2.4.x before 2.4.29 may allow local users to cause a denial of service (crash) or execute arbitrary code via negative vi.in_size or vi.out_size values, which may trigger a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:29.559-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:20.414-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:08.693-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11690 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:03.262-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:21.186-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
          <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1169" version="1" class="vulnerability">
      <metadata>
        <title>gzip Hard Link Attack</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>gzip</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0988"/>
        <description>Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-22T12:38:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="gzip RPM earlier than 0:1.3.3-12rhel3" negate="false" test_ref="oval:org.mitre.oval:tst:2667"/>
        </criteria>
        <criteria comment="Configuration section" operator="OR">
          <criterion comment="/usr/bin/gunzip is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2665"/>
          <criterion comment="/usr/bin/gzip is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2666"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11687" version="6" class="vulnerability">
      <metadata>
        <title>ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736"/>
        <description>ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:15.108-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:19.244-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:07.497-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11687 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:16.372-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:19.827-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gcc-ppc32 is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39888"/>
            <criterion comment="gcc-java is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39446"/>
            <criterion comment="gcc-g77 is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39829"/>
            <criterion comment="libgcj is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:38894"/>
            <criterion comment="gcc-c++ is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39648"/>
            <criterion comment="libobjc is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39643"/>
            <criterion comment="libstdc++ is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39297"/>
            <criterion comment="libf2c is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39324"/>
            <criterion comment="gcc-c++-ppc32 is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39622"/>
            <criterion comment="gcc-objc is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39791"/>
            <criterion comment="libgnat is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39571"/>
            <criterion comment="libtool-libs is earlier than 0:1.4.3-7" test_ref="oval:org.mitre.oval:tst:39400"/>
            <criterion comment="libstdc++-devel is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39577"/>
            <criterion comment="gcc-gnat is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39778"/>
            <criterion comment="cpp is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39694"/>
            <criterion comment="libgcj-devel is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39836"/>
            <criterion comment="gcc is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39781"/>
            <criterion comment="libgcc is earlier than 0:3.2.3-60" test_ref="oval:org.mitre.oval:tst:39401"/>
            <criterion comment="libtool is earlier than 0:1.4.3-7" test_ref="oval:org.mitre.oval:tst:39314"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gcc-ppc32 is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39986"/>
            <criterion comment="gcc4-gfortran is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39498"/>
            <criterion comment="gcc-java is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39736"/>
            <criterion comment="gcc-g77 is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39013"/>
            <criterion comment="libgcj is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39960"/>
            <criterion comment="gcc-c++ is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39305"/>
            <criterion comment="libobjc is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39783"/>
            <criterion comment="libgomp is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39491"/>
            <criterion comment="libstdc++ is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39254"/>
            <criterion comment="libgcj4-src is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39874"/>
            <criterion comment="libmudflap-devel is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39639"/>
            <criterion comment="libf2c is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39768"/>
            <criterion comment="gcc-c++-ppc32 is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:38996"/>
            <criterion comment="gcc-objc is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39661"/>
            <criterion comment="gcc4-c++ is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39597"/>
            <criterion comment="libgnat is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39878"/>
            <criterion comment="gcc4 is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39462"/>
            <criterion comment="libtool-libs is earlier than 0:1.5.6-5.el4_8" test_ref="oval:org.mitre.oval:tst:39563"/>
            <criterion comment="libgfortran is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39690"/>
            <criterion comment="gcc4-java is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39853"/>
            <criterion comment="libmudflap is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:38912"/>
            <criterion comment="libstdc++-devel is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39809"/>
            <criterion comment="libgcj4-devel is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39596"/>
            <criterion comment="libgcj-devel is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39567"/>
            <criterion comment="gcc-gnat is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39750"/>
            <criterion comment="cpp is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39937"/>
            <criterion comment="gcc is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:39370"/>
            <criterion comment="libgcc is earlier than 0:3.4.6-11.el4_8.1" test_ref="oval:org.mitre.oval:tst:38965"/>
            <criterion comment="libtool is earlier than 0:1.5.6-5.el4_8" test_ref="oval:org.mitre.oval:tst:39452"/>
            <criterion comment="libgcj4 is earlier than 0:4.1.2-44.EL4_8.1" test_ref="oval:org.mitre.oval:tst:39599"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtool-ltdl-devel is earlier than 0:1.5.22-7.el5_4" test_ref="oval:org.mitre.oval:tst:39632"/>
            <criterion comment="gcc-gfortran is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39424"/>
            <criterion comment="gcc-java is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39841"/>
            <criterion comment="libgcj is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39777"/>
            <criterion comment="gcc-c++ is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39779"/>
            <criterion comment="libobjc is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39790"/>
            <criterion comment="libstdc++ is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39808"/>
            <criterion comment="libmudflap-devel is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39820"/>
            <criterion comment="gcc-objc is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39409"/>
            <criterion comment="libgnat is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39459"/>
            <criterion comment="libgcj-src is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39523"/>
            <criterion comment="libgfortran is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39689"/>
            <criterion comment="libtool-ltdl is earlier than 0:1.5.22-7.el5_4" test_ref="oval:org.mitre.oval:tst:39601"/>
            <criterion comment="libmudflap is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39540"/>
            <criterion comment="libstdc++-devel is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39676"/>
            <criterion comment="gcc-objc++ is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39863"/>
            <criterion comment="gcc-gnat is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39537"/>
            <criterion comment="cpp is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39594"/>
            <criterion comment="libgcj-devel is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39638"/>
            <criterion comment="gcc is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:39483"/>
            <criterion comment="libgcc is earlier than 0:4.1.2-46.el5_4.2" test_ref="oval:org.mitre.oval:tst:38946"/>
            <criterion comment="libtool is earlier than 0:1.5.22-7.el5_4" test_ref="oval:org.mitre.oval:tst:39774"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11682" version="5" class="vulnerability">
      <metadata>
        <title>wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1487"/>
        <description>wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:31.480-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:18.468-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:06.651-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11682 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:02.761-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:19.110-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="wget is earlier than 0:1.10.1-1.30E.1" test_ref="oval:org.mitre.oval:tst:31680"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="wget is earlier than 0:1.10.1-2.4E.1" test_ref="oval:org.mitre.oval:tst:31717"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11678" version="5" class="vulnerability">
      <metadata>
        <title>The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0884"/>
        <description>The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:23.673-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:17.910-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:06.112-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11678 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:56.646-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:18.355-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="cyrus-sasl-plain is earlier than 0:2.1.15-10" test_ref="oval:org.mitre.oval:tst:30998"/>
          <criterion comment="cyrus-sasl-md5 is earlier than 0:2.1.15-10" test_ref="oval:org.mitre.oval:tst:30879"/>
          <criterion comment="cyrus-sasl-gssapi is earlier than 0:2.1.15-10" test_ref="oval:org.mitre.oval:tst:30974"/>
          <criterion comment="cyrus-sasl-devel is earlier than 0:2.1.15-10" test_ref="oval:org.mitre.oval:tst:30854"/>
          <criterion comment="cyrus-sasl is earlier than 0:2.1.15-10" test_ref="oval:org.mitre.oval:tst:30727"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11672" version="5" class="vulnerability">
      <metadata>
        <title>Wireshark 0.99.5 allows remote attackers to cause a denial of service (memory consumption) via a malformed DCP ETSI packet that triggers an infinite loop.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391"/>
        <description>Wireshark 0.99.5 allows remote attackers to cause a denial of service (memory consumption) via a malformed DCP ETSI packet that triggers an infinite loop.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:01.791-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:17.136-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:05.181-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11672 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:06.650-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:17.190-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.6-EL4.1" test_ref="oval:org.mitre.oval:tst:34755"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.6-EL4.1" test_ref="oval:org.mitre.oval:tst:34881"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.6-1.el5" test_ref="oval:org.mitre.oval:tst:34336"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.6-1.el5" test_ref="oval:org.mitre.oval:tst:34784"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11670" version="5" class="vulnerability">
      <metadata>
        <title>** DISPUTED **  PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.  NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled.  Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE.  However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2842"/>
        <description>** DISPUTED **  PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.  NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled.  Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE.  However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:49.710-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:16.871-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:04.908-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11670 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:33.710-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:16.795-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.6-7.el3" test_ref="oval:org.mitre.oval:tst:32403"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.6-7.el4" test_ref="oval:org.mitre.oval:tst:32654"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11668" version="5" class="vulnerability">
      <metadata>
        <title>The XPInstall installer in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 sets insecure permissions for certain installed files within xpi packages, which could allow local users to overwrite arbitrary files or execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0906"/>
        <description>The XPInstall installer in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 sets insecure permissions for certain installed files within xpi packages, which could allow local users to overwrite arbitrary files or execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:14.694-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:16.563-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:04.602-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11668 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:28.620-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:16.411-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:30819"/>
          <criterion comment="mozilla is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31515"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31278"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31465"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31606"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31480"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31417"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31313"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31469"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31598"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11667" version="5" class="vulnerability">
      <metadata>
        <title>The XWD Decoder in ImageMagick before 6.2.2.3, and GraphicsMagick before 1.1.6-r1, allows remote attackers to cause a denial of service (infinite loop) via an image with a zero color mask.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1739"/>
        <description>The XWD Decoder in ImageMagick before 6.2.2.3, and GraphicsMagick before 1.1.6-r1, allows remote attackers to cause a denial of service (infinite loop) via an image with a zero color mask.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:43.365-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:16.242-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:04.267-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11667 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:08.263-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:15.922-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-15" test_ref="oval:org.mitre.oval:tst:31831"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-15" test_ref="oval:org.mitre.oval:tst:31900"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-15" test_ref="oval:org.mitre.oval:tst:31493"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-15" test_ref="oval:org.mitre.oval:tst:31810"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-15" test_ref="oval:org.mitre.oval:tst:31915"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-12" test_ref="oval:org.mitre.oval:tst:31946"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-12" test_ref="oval:org.mitre.oval:tst:31973"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-12" test_ref="oval:org.mitre.oval:tst:31596"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-12" test_ref="oval:org.mitre.oval:tst:31676"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-12" test_ref="oval:org.mitre.oval:tst:31629"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11665" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1095"/>
        <description>Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:25.946-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:15.675-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:03.676-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11665 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:16.013-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:14.709-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35512"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35540"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35394"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35541"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35553"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35552"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:34924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35155"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35441"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35489"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35324"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.5.el4" test_ref="oval:org.mitre.oval:tst:35240"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35182"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35311"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35454"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.7.el4" test_ref="oval:org.mitre.oval:tst:35398"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35351"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35482"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34790"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35291"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34577"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35262"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35202"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-5.el5" test_ref="oval:org.mitre.oval:tst:35177"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11659" version="5" class="vulnerability">
      <metadata>
        <title>fixproc in Net-snmp 5.x before 5.2.1-r1 creates temporary files insecurely, which allows local users to modify the contents of those files to execute arbitrary commands, or overwrite arbitrary files via a symlink attack.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1740"/>
        <description>fixproc in Net-snmp 5.x before 5.2.1-r1 creates temporary files insecurely, which allows local users to modify the contents of those files to execute arbitrary commands, or overwrite arbitrary files via a symlink attack.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:31.920-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:15.344-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:02.719-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11659 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:29.977-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:14.250-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31395"/>
            <criterion comment="net-snmp is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:30763"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31684"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31547"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.0.9-2.30E.19" test_ref="oval:org.mitre.oval:tst:31390"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31408"/>
            <criterion comment="net-snmp is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:30993"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31414"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31691"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.1.2-11.EL4.6" test_ref="oval:org.mitre.oval:tst:31766"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11656" version="3" class="vulnerability">
      <metadata>
        <title>OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>Red Hat Enterprise Linux Extras 3</platform>
          <platform>Red Hat Enterprise Linux Extras 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339"/>
        <description>OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:37.304-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:14.471-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:01.787-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <criteria operator="OR">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.18" test_ref="oval:org.mitre.oval:tst:32805"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.18" test_ref="oval:org.mitre.oval:tst:33042"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-33.18" test_ref="oval:org.mitre.oval:tst:32520"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-16.43" test_ref="oval:org.mitre.oval:tst:32845"/>
          </criteria>
        </criteria>
        <criteria operator="AND">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
          <criteria operator="OR">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-43.11" test_ref="oval:org.mitre.oval:tst:32332"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-43.11" test_ref="oval:org.mitre.oval:tst:32884"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-43.11" test_ref="oval:org.mitre.oval:tst:32770"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-22.43" test_ref="oval:org.mitre.oval:tst:32336"/>
          </criteria>
        </criteria>
        <criteria operator="AND">
          <criterion comment="redhat-release is version 3" test_ref="oval:org.mitre.oval:tst:30337"/>
          <criteria operator="OR">
            <criterion comment="java-1.4.2-ibm-plugin is earlier than 0:1.4.2.7-1jpp.4.el3" test_ref="oval:org.mitre.oval:tst:33298"/>
            <criterion comment="java-1.4.2-ibm-jdbc is earlier than 0:1.4.2.7-1jpp.4.el3" test_ref="oval:org.mitre.oval:tst:33521"/>
            <criterion comment="java-1.4.2-ibm-devel is earlier than 0:1.4.2.7-1jpp.4.el3" test_ref="oval:org.mitre.oval:tst:33376"/>
            <criterion comment="java-1.4.2-ibm is earlier than 0:1.4.2.7-1jpp.4.el3" test_ref="oval:org.mitre.oval:tst:33428"/>
            <criterion comment="java-1.4.2-ibm-src is earlier than 0:1.4.2.7-1jpp.4.el3" test_ref="oval:org.mitre.oval:tst:33515"/>
            <criterion comment="java-1.4.2-ibm-demo is earlier than 0:1.4.2.7-1jpp.4.el3" test_ref="oval:org.mitre.oval:tst:33417"/>
          </criteria>
        </criteria>
        <criteria operator="AND">
          <criterion comment="redhat-release is version 4" test_ref="oval:org.mitre.oval:tst:29709"/>
          <criteria operator="OR">
            <criterion comment="java-1.5.0-ibm-javacomm is earlier than 1:1.5.0.3-1jpp.3.el4" test_ref="oval:org.mitre.oval:tst:32803"/>
            <criterion comment="java-1.5.0-ibm-devel is earlier than 1:1.5.0.3-1jpp.3.el4" test_ref="oval:org.mitre.oval:tst:33585"/>
            <criterion comment="java-1.5.0-ibm-src is earlier than 1:1.5.0.3-1jpp.3.el4" test_ref="oval:org.mitre.oval:tst:33064"/>
            <criterion comment="java-1.5.0-ibm-demo is earlier than 1:1.5.0.3-1jpp.3.el4" test_ref="oval:org.mitre.oval:tst:33481"/>
            <criterion comment="java-1.4.2-ibm-devel is earlier than 0:1.4.2.7-1jpp.4.el4" test_ref="oval:org.mitre.oval:tst:33563"/>
            <criterion comment="java-1.4.2-ibm is earlier than 0:1.4.2.7-1jpp.4.el4" test_ref="oval:org.mitre.oval:tst:33479"/>
            <criterion comment="java-1.4.2-ibm-src is earlier than 0:1.4.2.7-1jpp.4.el4" test_ref="oval:org.mitre.oval:tst:33472"/>
            <criterion comment="java-1.4.2-ibm-javacomm is earlier than 0:1.4.2.7-1jpp.4.el4" test_ref="oval:org.mitre.oval:tst:32903"/>
            <criterion comment="java-1.5.0-ibm is earlier than 1:1.5.0.3-1jpp.3.el4" test_ref="oval:org.mitre.oval:tst:33667"/>
            <criterion comment="java-1.4.2-ibm-plugin is earlier than 0:1.4.2.7-1jpp.4.el4" test_ref="oval:org.mitre.oval:tst:33199"/>
            <criterion comment="java-1.5.0-ibm-plugin is earlier than 1:1.5.0.3-1jpp.3.el4" test_ref="oval:org.mitre.oval:tst:33754"/>
            <criterion comment="java-1.5.0-ibm-jdbc is earlier than 1:1.5.0.3-1jpp.3.el4" test_ref="oval:org.mitre.oval:tst:33366"/>
            <criterion comment="java-1.4.2-ibm-jdbc is earlier than 0:1.4.2.7-1jpp.4.el4" test_ref="oval:org.mitre.oval:tst:33073"/>
            <criterion comment="java-1.4.2-ibm-demo is earlier than 0:1.4.2.7-1jpp.4.el4" test_ref="oval:org.mitre.oval:tst:33547"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11652" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419"/>
        <description>Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:44.160-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:12.956-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:11:00.275-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11652 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:47.538-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:11.783-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36256"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36236"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35996"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36279"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36046"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36052"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36034"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36284"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35748"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35994"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36164"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36050"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-8.el4" test_ref="oval:org.mitre.oval:tst:36202"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36193"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36093"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36053"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.10.el4" test_ref="oval:org.mitre.oval:tst:35919"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35600"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36141"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35397"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36203"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:36281"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:35480"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-8.el5" test_ref="oval:org.mitre.oval:tst:35675"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11648" version="5" class="vulnerability">
      <metadata>
        <title>Ethereal 0.9.15 and earlier, and Tethereal, allows remote attackers to cause a denial of service (crash) via certain malformed (1) ISAKMP or (2) MEGACO packets.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0926"/>
        <description>Ethereal 0.9.15 and earlier, and Tethereal, allows remote attackers to cause a denial of service (crash) via certain malformed (1) ISAKMP or (2) MEGACO packets.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:27.243-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:12.392-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:59.545-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11648 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:15.276-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:11.185-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.9.16-0.30E.1" test_ref="oval:org.mitre.oval:tst:30378"/>
          <criterion comment="ethereal is earlier than 0:0.9.16-0.30E.1" test_ref="oval:org.mitre.oval:tst:29663"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11646" version="5" class="vulnerability">
      <metadata>
        <title>The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0097"/>
        <description>The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:26.715-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:11.858-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:58.987-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11646 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:42.933-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:10.409-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.7" test_ref="oval:org.mitre.oval:tst:30954"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.3" test_ref="oval:org.mitre.oval:tst:31281"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11645" version="5" class="vulnerability">
      <metadata>
        <title>pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471"/>
        <description>pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:49.333-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:11.537-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:58.700-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11645 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:59.125-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:09.921-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="netpbm is earlier than 0:9.24-11.30.2" test_ref="oval:org.mitre.oval:tst:32033"/>
            <criterion comment="netpbm-progs is earlier than 0:9.24-11.30.2" test_ref="oval:org.mitre.oval:tst:31648"/>
            <criterion comment="netpbm-devel is earlier than 0:9.24-11.30.2" test_ref="oval:org.mitre.oval:tst:32153"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="netpbm is earlier than 0:10.25-2.EL4.1" test_ref="oval:org.mitre.oval:tst:32140"/>
            <criterion comment="netpbm-progs is earlier than 0:10.25-2.EL4.1" test_ref="oval:org.mitre.oval:tst:32026"/>
            <criterion comment="netpbm-devel is earlier than 0:10.25-2.EL4.1" test_ref="oval:org.mitre.oval:tst:32045"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11643" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562"/>
        <description>Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:03.298-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:11.240-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:58.394-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11643 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:31.273-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:09.444-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:39600"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:40430"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:40437"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:39877"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40351"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40208"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11633" version="5" class="vulnerability">
      <metadata>
        <title>The SNMP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071"/>
        <description>The SNMP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:25.709-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:10.208-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:57.304-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11633 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:39.873-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:07.934-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37624"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37249"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37725"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37542"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37460"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11632" version="5" class="vulnerability">
      <metadata>
        <title>The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2812"/>
        <description>The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:42.138-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:09.531-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:56.579-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11632 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:53:02.557-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:06.973-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37931"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37846"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37817"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37663"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37799"/>
            <criterion comment="kernel is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37028"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37885"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37981"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37117"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37213"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37299"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:36859"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37581"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37124"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37535"/>
            <criterion comment="kernel is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37548"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37152"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37393"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37071"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-78.EL" test_ref="oval:org.mitre.oval:tst:37024"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:36537"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:36954"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37079"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:36957"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37527"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37262"/>
            <criterion comment="kernel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37410"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37323"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37508"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37153"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37180"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37188"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11629" version="5" class="vulnerability">
      <metadata>
        <title>The InstallTrigger.install method in Firefox before 1.0.5 and Mozilla before 1.7.9 allows remote attackers to execute a callback function in the context of another domain by forcing a page navigation after the install method has been called, which causes the callback to be run in the context of the new page and results in a same origin violation.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2263"/>
        <description>The InstallTrigger.install method in Firefox before 1.0.5 and Mozilla before 1.7.9 allows remote attackers to execute a callback function in the context of another domain by forcing a page navigation after the install method has been called, which causes the callback to be run in the context of the new page and results in a same origin violation.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:46.835-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:09.005-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:56.085-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11629 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:52.669-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:03.274-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32142"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32131"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32154"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32001"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32171"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32162"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31782"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32041"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32004"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31353"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32120"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31633"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31837"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32100"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31821"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31904"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31814"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31951"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31554"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32149"/>
            <criterion comment="firefox is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32167"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31998"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32061"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11628" version="5" class="vulnerability">
      <metadata>
        <title>The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0136"/>
        <description>The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:27.790-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:08.600-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:55.649-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11628 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:34.359-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:02.678-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31783"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31876"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31592"/>
            <criterion comment="kernel is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31714"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31522"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31902"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31817"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11626" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the (1) nanohttp or (2) nanoftp modules in XMLSoft Libxml 2 (Libxml2) 2.6.0 through 2.6.5 allow remote attackers to execute arbitrary code via a long URL.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0110"/>
        <description>Buffer overflow in the (1) nanohttp or (2) nanoftp modules in XMLSoft Libxml 2 (Libxml2) 2.6.0 through 2.6.5 allow remote attackers to execute arbitrary code via a long URL.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:54.304-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:08.368-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:55.403-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11626 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:36.294-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:02.176-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="libxml2-devel is earlier than 0:2.5.10-6" test_ref="oval:org.mitre.oval:tst:30643"/>
          <criterion comment="libxml2-python is earlier than 0:2.5.10-6" test_ref="oval:org.mitre.oval:tst:30458"/>
          <criterion comment="libxml-devel is earlier than 1:1.8.17-9.2" test_ref="oval:org.mitre.oval:tst:31134"/>
          <criterion comment="libxml is earlier than 1:1.8.17-9.2" test_ref="oval:org.mitre.oval:tst:30957"/>
          <criterion comment="libxml2 is earlier than 0:2.5.10-6" test_ref="oval:org.mitre.oval:tst:30657"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11624" version="5" class="vulnerability">
      <metadata>
        <title>Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1578"/>
        <description>Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:01.407-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:07.804-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:54.563-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11624 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:35.123-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:15:01.672-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-13.el3" test_ref="oval:org.mitre.oval:tst:38027"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-5.el4_8.5" test_ref="oval:org.mitre.oval:tst:38669"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:37946"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11611" version="5" class="vulnerability">
      <metadata>
        <title>The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3002"/>
        <description>The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:01.605-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:05.593-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:52.299-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11611 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:34.239-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:59.155-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39591"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39396"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39586"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39171"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39299"/>
          <criterion comment="kernel is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39151"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39468"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39460"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:38810"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11609" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Unicode sequences with "zero-width non-joiner" characters.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2702"/>
        <description>Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Unicode sequences with "zero-width non-joiner" characters.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:32.686-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:05.101-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:51.748-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11609 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:12.549-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:58.462-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32169"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:31729"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32242"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32151"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32014"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32144"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32068"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32248"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32293"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32244"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32012"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:31897"/>
            <criterion comment="thunderbird is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:31477"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32300"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32226"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32289"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32170"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32150"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32302"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32090"/>
            <criterion comment="firefox is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:32147"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32209"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32088"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11607" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1) the document.loadBindingDocument function and (2) XSLT.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4060"/>
        <description>Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1) the document.loadBindingDocument function and (2) XSLT.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:02.444-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:04.453-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:51.122-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11607 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:42.526-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:57.610-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-16.el4" test_ref="oval:org.mitre.oval:tst:37634"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el4" test_ref="oval:org.mitre.oval:tst:37195"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37248"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37486"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37495"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37044"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.17-1.el5" test_ref="oval:org.mitre.oval:tst:37230"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37578"/>
            <criterion comment="yelp is earlier than 0:2.16.0-21.el5" test_ref="oval:org.mitre.oval:tst:37584"/>
            <criterion comment="devhelp is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37353"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37406"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el5" test_ref="oval:org.mitre.oval:tst:37225"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:36664"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37664"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11605" version="5" class="vulnerability">
      <metadata>
        <title>Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0175"/>
        <description>Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:01.628-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:04.233-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:50.858-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11605 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:29:39.139-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:57.241-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.7" test_ref="oval:org.mitre.oval:tst:30954"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.3" test_ref="oval:org.mitre.oval:tst:31281"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11604" version="5" class="vulnerability">
      <metadata>
        <title>The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321"/>
        <description>The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:13.733-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:03.789-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:50.450-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11604 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:04.121-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:56.151-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-72" test_ref="oval:org.mitre.oval:tst:40084"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-72" test_ref="oval:org.mitre.oval:tst:40256"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-72" test_ref="oval:org.mitre.oval:tst:40497"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-72" test_ref="oval:org.mitre.oval:tst:39569"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-72" test_ref="oval:org.mitre.oval:tst:40456"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-62.el4_8.2" test_ref="oval:org.mitre.oval:tst:40540"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-62.el4_8.2" test_ref="oval:org.mitre.oval:tst:39992"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-62.el4_8.2" test_ref="oval:org.mitre.oval:tst:40545"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-62.el4_8.2" test_ref="oval:org.mitre.oval:tst:40034"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-62.el4_8.2" test_ref="oval:org.mitre.oval:tst:40469"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.6.1-36.el5_5.4" test_ref="oval:org.mitre.oval:tst:40475"/>
            <criterion comment="krb5 is earlier than 0:1.6.1-36.el5_5.4" test_ref="oval:org.mitre.oval:tst:39803"/>
            <criterion comment="krb5-libs is earlier than 0:1.6.1-36.el5_5.4" test_ref="oval:org.mitre.oval:tst:40429"/>
            <criterion comment="krb5-server is earlier than 0:1.6.1-36.el5_5.4" test_ref="oval:org.mitre.oval:tst:40211"/>
            <criterion comment="krb5-devel is earlier than 0:1.6.1-36.el5_5.4" test_ref="oval:org.mitre.oval:tst:40461"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11602" version="5" class="vulnerability">
      <metadata>
        <title>Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655"/>
        <description>Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:23.007-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:03.291-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:49.886-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11602 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:01.961-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:55.426-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37606"/>
            <criterion comment="ruby-docs is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37736"/>
            <criterion comment="ruby-devel is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37427"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37760"/>
            <criterion comment="ruby is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37497"/>
            <criterion comment="irb is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:37751"/>
            <criterion comment="ruby-libs is earlier than 0:1.6.8-13.el3" test_ref="oval:org.mitre.oval:tst:36770"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-mode is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37462"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37630"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:36810"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:36902"/>
            <criterion comment="ruby is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37678"/>
            <criterion comment="irb is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37674"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.1-7.el4_7.1" test_ref="oval:org.mitre.oval:tst:37720"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ruby-ri is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37735"/>
            <criterion comment="ruby-mode is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37344"/>
            <criterion comment="ruby-docs is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37697"/>
            <criterion comment="ruby-devel is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37273"/>
            <criterion comment="ruby is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37563"/>
            <criterion comment="ruby-libs is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37438"/>
            <criterion comment="ruby-tcltk is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37757"/>
            <criterion comment="ruby-irb is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37463"/>
            <criterion comment="ruby-rdoc is earlier than 0:1.8.5-5.el5_2.5" test_ref="oval:org.mitre.oval:tst:37172"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11599" version="5" class="vulnerability">
      <metadata>
        <title>The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4990"/>
        <description>The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:21.837-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:01.706-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:48.456-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11599 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:57.125-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:53.412-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35923"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35665"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36014"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35929"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36011"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35836"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35726"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35715"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35610"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36025"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35789"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35804"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35865"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35793"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35903"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35965"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35922"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35504"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35045"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35914"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35831"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35998"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35975"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36031"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35971"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35711"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35933"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35826"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35753"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35678"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35795"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35934"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35467"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35946"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36116"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35116"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36004"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35483"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36103"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36060"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36074"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35895"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35905"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36012"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35984"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35857"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35681"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35909"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11598" version="5" class="vulnerability">
      <metadata>
        <title>Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385"/>
        <description>Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:34.836-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:00.930-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:47.773-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11598 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:36.962-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:52.557-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39591"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39396"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39586"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39171"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39299"/>
            <criterion comment="kernel is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39151"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39468"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39460"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:38810"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38892"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38222"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:37924"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38847"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38834"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38158"/>
            <criterion comment="kernel is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38513"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38317"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38277"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38667"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-89.0.3.EL" test_ref="oval:org.mitre.oval:tst:38814"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38128"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38668"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38883"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38948"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38732"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38969"/>
            <criterion comment="kernel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38991"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:39056"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38817"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:39009"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38672"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-128.4.1.el5" test_ref="oval:org.mitre.oval:tst:38983"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11597" version="5" class="vulnerability">
      <metadata>
        <title>The configtest function in the Red Hat dhcpd init script for DHCP 3.0.1 in Red Hat Enterprise Linux (RHEL) 3 allows local users to overwrite arbitrary files via a symlink attack on an unspecified temporary file, related to the "dhcpd -t" command.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1893"/>
        <description>The configtest function in the Red Hat dhcpd init script for DHCP 3.0.1 in Red Hat Enterprise Linux (RHEL) 3 allows local users to overwrite arbitrary files via a symlink attack on an unspecified temporary file, related to the "dhcpd -t" command.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:17.209-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:00.702-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:47.545-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11597 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:05.264-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:52.240-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="dhclient is earlier than 7:3.0.1-10.2_EL3" test_ref="oval:org.mitre.oval:tst:38360"/>
          <criterion comment="dhcp is earlier than 7:3.0.1-10.2_EL3" test_ref="oval:org.mitre.oval:tst:38535"/>
          <criterion comment="dhcp-devel is earlier than 7:3.0.1-10.2_EL3" test_ref="oval:org.mitre.oval:tst:38243"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11594" version="5" class="vulnerability">
      <metadata>
        <title>The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284"/>
        <description>The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:51.134-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:10:00.182-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:46.862-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11594 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:23.628-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:51.422-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.5.10-8" test_ref="oval:org.mitre.oval:tst:36021"/>
            <criterion comment="libxml2-python is earlier than 0:2.5.10-8" test_ref="oval:org.mitre.oval:tst:35780"/>
            <criterion comment="libxml2 is earlier than 0:2.5.10-8" test_ref="oval:org.mitre.oval:tst:36040"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.16-10.1" test_ref="oval:org.mitre.oval:tst:35997"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.16-10.1" test_ref="oval:org.mitre.oval:tst:36010"/>
            <criterion comment="libxml2 is earlier than 0:2.6.16-10.1" test_ref="oval:org.mitre.oval:tst:36108"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libxml2-devel is earlier than 0:2.6.26-2.1.2.1" test_ref="oval:org.mitre.oval:tst:36081"/>
            <criterion comment="libxml2-python is earlier than 0:2.6.26-2.1.2.1" test_ref="oval:org.mitre.oval:tst:36005"/>
            <criterion comment="libxml2 is earlier than 0:2.6.26-2.1.2.1" test_ref="oval:org.mitre.oval:tst:35956"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11591" version="5" class="vulnerability">
      <metadata>
        <title>The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692"/>
        <description>The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:46.738-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:58.682-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:45.381-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11591 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:06.342-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:50.572-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:39011"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38739"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38992"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38800"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:39114"/>
            <criterion comment="kernel is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:39044"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:39194"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38832"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-60.EL" test_ref="oval:org.mitre.oval:tst:38859"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39007"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38642"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38673"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39035"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38510"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38920"/>
            <criterion comment="kernel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39188"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39065"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39182"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:39164"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-89.0.9.EL" test_ref="oval:org.mitre.oval:tst:38624"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39175"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38848"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39017"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38949"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39066"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38199"/>
            <criterion comment="kernel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39057"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39072"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38868"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:39155"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38973"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-128.7.1.el5" test_ref="oval:org.mitre.oval:tst:38459"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11589" version="5" class="vulnerability">
      <metadata>
        <title>Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304"/>
        <description>Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:17.516-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:58.318-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:44.958-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11589 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:08.621-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:49.970-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-68.ent" test_ref="oval:org.mitre.oval:tst:34512"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.46-68.ent" test_ref="oval:org.mitre.oval:tst:33919"/>
            <criterion comment="httpd is earlier than 0:2.0.46-68.ent" test_ref="oval:org.mitre.oval:tst:34654"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-32.3.ent" test_ref="oval:org.mitre.oval:tst:34770"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-32.3.ent" test_ref="oval:org.mitre.oval:tst:33780"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-32.3.ent" test_ref="oval:org.mitre.oval:tst:34746"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.52-32.3.ent" test_ref="oval:org.mitre.oval:tst:34650"/>
            <criterion comment="httpd is earlier than 0:2.0.52-32.3.ent" test_ref="oval:org.mitre.oval:tst:34520"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-manual is earlier than 0:2.2.3-7.el5" test_ref="oval:org.mitre.oval:tst:34730"/>
            <criterion comment="httpd-devel is earlier than 0:2.2.3-7.el5" test_ref="oval:org.mitre.oval:tst:34677"/>
            <criterion comment="mod_ssl is earlier than 1:2.2.3-7.el5" test_ref="oval:org.mitre.oval:tst:34399"/>
            <criterion comment="httpd is earlier than 0:2.2.3-7.el5" test_ref="oval:org.mitre.oval:tst:34605"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11580" version="5" class="vulnerability">
      <metadata>
        <title>Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2917"/>
        <description>Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:40.342-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:57.543-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:43.907-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11580 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:29:49.195-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:48.859-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.16" test_ref="oval:org.mitre.oval:tst:32217"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.12" test_ref="oval:org.mitre.oval:tst:32319"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11579" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0016"/>
        <description>Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:29.592-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:57.074-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:43.434-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11579 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:33.630-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:48.210-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-16.el4" test_ref="oval:org.mitre.oval:tst:37634"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="thunderbird is earlier than 0:2.0.0.17-1.el5" test_ref="oval:org.mitre.oval:tst:37230"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11575" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286"/>
        <description>Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:21.505-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:56.342-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:42.671-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11575 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:41.137-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:47.231-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33776"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33817"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33769"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33528"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33915"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33822"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33351"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:34016"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33395"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33957"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33405"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33642"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33024"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33690"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33995"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33892"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33945"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33711"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33857"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33644"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33920"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11572" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015"/>
        <description>Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:16.004-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:55.935-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:42.298-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11572 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:43.732-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:46.631-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.9-1.3E.14.3" test_ref="oval:org.mitre.oval:tst:35741"/>
            <criterion comment="samba-swat is earlier than 0:3.0.9-1.3E.14.3" test_ref="oval:org.mitre.oval:tst:35374"/>
            <criterion comment="samba-client is earlier than 0:3.0.9-1.3E.14.3" test_ref="oval:org.mitre.oval:tst:35870"/>
            <criterion comment="samba is earlier than 0:3.0.9-1.3E.14.3" test_ref="oval:org.mitre.oval:tst:35978"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.25b-1.el4_6.4" test_ref="oval:org.mitre.oval:tst:35595"/>
            <criterion comment="samba-swat is earlier than 0:3.0.25b-1.el4_6.4" test_ref="oval:org.mitre.oval:tst:35306"/>
            <criterion comment="samba-client is earlier than 0:3.0.25b-1.el4_6.4" test_ref="oval:org.mitre.oval:tst:35481"/>
            <criterion comment="samba is earlier than 0:3.0.25b-1.el4_6.4" test_ref="oval:org.mitre.oval:tst:35294"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.25b-1.el5_1.4" test_ref="oval:org.mitre.oval:tst:35516"/>
            <criterion comment="samba-swat is earlier than 0:3.0.25b-1.el5_1.4" test_ref="oval:org.mitre.oval:tst:35751"/>
            <criterion comment="samba-client is earlier than 0:3.0.25b-1.el5_1.4" test_ref="oval:org.mitre.oval:tst:35112"/>
            <criterion comment="samba is earlier than 0:3.0.25b-1.el5_1.4" test_ref="oval:org.mitre.oval:tst:35677"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11570" version="5" class="vulnerability">
      <metadata>
        <title>Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801"/>
        <description>Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:03.711-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:55.177-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:41.510-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11570 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:23.248-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:45.530-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="rdesktop is earlier than 0:1.2.0-3" test_ref="oval:org.mitre.oval:tst:37386"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="rdesktop is earlier than 0:1.3.1-9" test_ref="oval:org.mitre.oval:tst:37567"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="rdesktop is earlier than 0:1.4.1-6" test_ref="oval:org.mitre.oval:tst:37100"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11569" version="5" class="vulnerability">
      <metadata>
        <title>The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772"/>
        <description>The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:41.545-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:54.555-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:40.862-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11569 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:26.160-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:44.715-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tix is earlier than 0:8.1.4-92.8" test_ref="oval:org.mitre.oval:tst:36200"/>
            <criterion comment="tclx is earlier than 0:8.3-92.8" test_ref="oval:org.mitre.oval:tst:35800"/>
            <criterion comment="tcl-devel is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:35961"/>
            <criterion comment="expect-devel is earlier than 0:5.38.0-92.8" test_ref="oval:org.mitre.oval:tst:36175"/>
            <criterion comment="tcltk is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:36169"/>
            <criterion comment="itcl is earlier than 0:3.2-92.8" test_ref="oval:org.mitre.oval:tst:35879"/>
            <criterion comment="tcl is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:36313"/>
            <criterion comment="expect is earlier than 0:5.38.0-92.8" test_ref="oval:org.mitre.oval:tst:35369"/>
            <criterion comment="tk-devel is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:36316"/>
            <criterion comment="tk is earlier than 0:8.3.5-92.8" test_ref="oval:org.mitre.oval:tst:36018"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35948"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35993"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36045"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35949"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36098"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36066"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35942"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36105"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35835"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35597"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36094"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35261"/>
            <criterion comment="postgresql-docs is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35907"/>
            <criterion comment="postgresql-pl is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35319"/>
            <criterion comment="postgresql-tcl is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35123"/>
            <criterion comment="postgresql-libs is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35894"/>
            <criterion comment="postgresql-contrib is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35781"/>
            <criterion comment="postgresql-python is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:36109"/>
            <criterion comment="postgresql-test is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35308"/>
            <criterion comment="postgresql-server is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35856"/>
            <criterion comment="postgresql-devel is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:36044"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11567" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956"/>
        <description>Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:22.284-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:53.928-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:40.254-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11567 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:16.713-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:43.643-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-73.ent" test_ref="oval:org.mitre.oval:tst:38833"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-73.ent" test_ref="oval:org.mitre.oval:tst:38794"/>
            <criterion comment="httpd is earlier than 0:2.0.46-73.ent" test_ref="oval:org.mitre.oval:tst:38826"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="apr-util-devel is earlier than 0:0.9.4-22.el4_8.1" test_ref="oval:org.mitre.oval:tst:38152"/>
            <criterion comment="apr-util is earlier than 0:0.9.4-22.el4_8.1" test_ref="oval:org.mitre.oval:tst:38886"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="apr-util-docs is earlier than 0:1.2.7-7.el5_3.1" test_ref="oval:org.mitre.oval:tst:38344"/>
            <criterion comment="apr-util-devel is earlier than 0:1.2.7-7.el5_3.1" test_ref="oval:org.mitre.oval:tst:38871"/>
            <criterion comment="apr-util is earlier than 0:1.2.7-7.el5_3.1" test_ref="oval:org.mitre.oval:tst:38788"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11565" version="5" class="vulnerability">
      <metadata>
        <title>Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505"/>
        <description>Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:16.339-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:53.202-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:39.488-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11565 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:39.393-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:42.608-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32785"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33227"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33266"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33146"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32352"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33183"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33095"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33300"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32996"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33263"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33195"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33229"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32844"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33273"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33259"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33239"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33284"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33153"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33015"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33251"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33336"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32408"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11562" version="5" class="vulnerability">
      <metadata>
        <title>Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0718"/>
        <description>Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:47.467-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:52.947-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:39.257-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11562 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:20.607-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:42.263-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.13" test_ref="oval:org.mitre.oval:tst:31246"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.9" test_ref="oval:org.mitre.oval:tst:31854"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11561" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0747"/>
        <description>Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:56.557-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:52.742-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:38.988-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11561 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:26.192-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:41.942-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30894"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30928"/>
          <criterion comment="httpd is earlier than 0:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30979"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11557" version="5" class="vulnerability">
      <metadata>
        <title>mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0381"/>
        <description>mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:21.313-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:52.219-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:38.578-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11557 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:32.006-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:41.367-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mysql is earlier than 0:3.23.58-2.3" test_ref="oval:org.mitre.oval:tst:31033"/>
          <criterion comment="mysql-devel is earlier than 0:3.23.58-2.3" test_ref="oval:org.mitre.oval:tst:30615"/>
          <criterion comment="mysql-bench is earlier than 0:3.23.58-2.3" test_ref="oval:org.mitre.oval:tst:31039"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11549" version="5" class="vulnerability">
      <metadata>
        <title>Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2953"/>
        <description>Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:47.802-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:51.537-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:37.848-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11549 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:55.895-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:40.356-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37217"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37049"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37429"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37390"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37492"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37521"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37326"/>
            <criterion comment="vim is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:36926"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37520"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37284"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37412"/>
            <criterion comment="vim-enhanced is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37218"/>
            <criterion comment="vim is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37405"/>
            <criterion comment="vim-X11 is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37384"/>
            <criterion comment="vim-common is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37365"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11546" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163"/>
        <description>Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:09.649-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:51.199-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:37.499-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11546 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:02.789-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:39.780-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.58" test_ref="oval:org.mitre.oval:tst:38537"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.58" test_ref="oval:org.mitre.oval:tst:38572"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.58" test_ref="oval:org.mitre.oval:tst:38543"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38145"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38607"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38481"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-lpd is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38471"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:37935"/>
            <criterion comment="cups is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38334"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38541"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11541" version="5" class="vulnerability">
      <metadata>
        <title>sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-2069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2069"/>
        <description>sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:18.224-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:49.824-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:36.378-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11541 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:28.390-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:38.280-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="openssh is earlier than 0:3.6.1p2-33.30.6" test_ref="oval:org.mitre.oval:tst:31887"/>
          <criterion comment="openssh-askpass is earlier than 0:3.6.1p2-33.30.6" test_ref="oval:org.mitre.oval:tst:31483"/>
          <criterion comment="openssh-server is earlier than 0:3.6.1p2-33.30.6" test_ref="oval:org.mitre.oval:tst:31809"/>
          <criterion comment="openssh-clients is earlier than 0:3.6.1p2-33.30.6" test_ref="oval:org.mitre.oval:tst:31979"/>
          <criterion comment="openssh-askpass-gnome is earlier than 0:3.6.1p2-33.30.6" test_ref="oval:org.mitre.oval:tst:31909"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1154" version="1" class="vulnerability">
      <metadata>
        <title>bzip2 Arbitrary File Permission Modification Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>bzip2</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0953"/>
        <description>Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-11T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="bzip2 RPM earlier than 0:1.0.2-11.EL3.4" negate="false" test_ref="oval:org.mitre.oval:tst:2386"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/bzip2 is executable" negate="false" test_ref="oval:org.mitre.oval:tst:2385"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11539" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782"/>
        <description>Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:05.573-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:49.595-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:35.719-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11539 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:59.723-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:37.937-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-11.3.3" test_ref="oval:org.mitre.oval:tst:30887"/>
          <criterion comment="gtk2 is earlier than 0:2.2.4-8.1" test_ref="oval:org.mitre.oval:tst:30146"/>
          <criterion comment="gdk-pixbuf-gnome is earlier than 1:0.22.0-11.3.3" test_ref="oval:org.mitre.oval:tst:30822"/>
          <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-11.3.3" test_ref="oval:org.mitre.oval:tst:30571"/>
          <criterion comment="gtk2-devel is earlier than 0:2.2.4-8.1" test_ref="oval:org.mitre.oval:tst:30817"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11536" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-4798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4798"/>
        <description>Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:05.106-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:49.319-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:35.431-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11536 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:55.459-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:37.584-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32345"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32444"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32109"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32476"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32343"/>
          <criterion comment="kernel is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:31877"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32362"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:32190"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-40.EL" test_ref="oval:org.mitre.oval:tst:31899"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11533" version="5" class="vulnerability">
      <metadata>
        <title>Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overwrite arbitrary program variables and read or write the attachments and preferences of other users.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4019"/>
        <description>Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overwrite arbitrary program variables and read or write the attachments and preferences of other users.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:22.836-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:48.533-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:34.629-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11533 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:56.120-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:36.438-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-2.el3" test_ref="oval:org.mitre.oval:tst:33056"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-2.el4" test_ref="oval:org.mitre.oval:tst:33006"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11530" version="5" class="vulnerability">
      <metadata>
        <title>The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1447"/>
        <description>The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:11.685-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:48.209-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:34.292-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11530 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:22.892-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:35.870-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="perl-suidperl is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:40554"/>
            <criterion comment="perl is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:40615"/>
            <criterion comment="perl-CPAN is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:39713"/>
            <criterion comment="perl-CGI is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:40065"/>
            <criterion comment="perl-DB_File is earlier than 2:5.8.0-101.EL3" test_ref="oval:org.mitre.oval:tst:40367"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="perl-suidperl is earlier than 3:5.8.5-53.el4" test_ref="oval:org.mitre.oval:tst:40654"/>
            <criterion comment="perl is earlier than 3:5.8.5-53.el4" test_ref="oval:org.mitre.oval:tst:40417"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="perl-suidperl is earlier than 4:5.8.8-32.el5_5.1" test_ref="oval:org.mitre.oval:tst:40657"/>
            <criterion comment="perl is earlier than 4:5.8.8-32.el5_5.1" test_ref="oval:org.mitre.oval:tst:39926"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11528" version="5" class="vulnerability">
      <metadata>
        <title>CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0977"/>
        <description>CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:32.355-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:47.666-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:33.712-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11528 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:38.541-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:35.172-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="cvs is earlier than 0:1.11.2-14" test_ref="oval:org.mitre.oval:tst:29623"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11523" version="5" class="vulnerability">
      <metadata>
        <title>ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the "DNSSEC Validation" vulnerability.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494"/>
        <description>ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the "DNSSEC Validation" vulnerability.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:52.203-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:47.228-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:33.255-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11523 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:01.385-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:34.492-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bind-utils is earlier than 20:9.2.4-20.EL3" test_ref="oval:org.mitre.oval:tst:32461"/>
            <criterion comment="bind-devel is earlier than 20:9.2.4-20.EL3" test_ref="oval:org.mitre.oval:tst:33429"/>
            <criterion comment="bind-chroot is earlier than 20:9.2.4-20.EL3" test_ref="oval:org.mitre.oval:tst:33177"/>
            <criterion comment="bind is earlier than 20:9.2.4-20.EL3" test_ref="oval:org.mitre.oval:tst:33126"/>
            <criterion comment="bind-libs is earlier than 20:9.2.4-20.EL3" test_ref="oval:org.mitre.oval:tst:33256"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bind-utils is earlier than 20:9.2.4-24.EL4" test_ref="oval:org.mitre.oval:tst:32727"/>
            <criterion comment="bind-devel is earlier than 20:9.2.4-24.EL4" test_ref="oval:org.mitre.oval:tst:33357"/>
            <criterion comment="bind-chroot is earlier than 20:9.2.4-24.EL4" test_ref="oval:org.mitre.oval:tst:32675"/>
            <criterion comment="bind is earlier than 20:9.2.4-24.EL4" test_ref="oval:org.mitre.oval:tst:33136"/>
            <criterion comment="bind-libs is earlier than 20:9.2.4-24.EL4" test_ref="oval:org.mitre.oval:tst:33404"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bind-utils is earlier than 30:9.3.3-8.el5" test_ref="oval:org.mitre.oval:tst:33237"/>
            <criterion comment="bind-libbind-devel is earlier than 30:9.3.3-8.el5" test_ref="oval:org.mitre.oval:tst:32565"/>
            <criterion comment="bind-devel is earlier than 30:9.3.3-8.el5" test_ref="oval:org.mitre.oval:tst:33314"/>
            <criterion comment="bind-chroot is earlier than 30:9.3.3-8.el5" test_ref="oval:org.mitre.oval:tst:32936"/>
            <criterion comment="caching-nameserver is earlier than 30:9.3.3-8.el5" test_ref="oval:org.mitre.oval:tst:33164"/>
            <criterion comment="bind-sdb is earlier than 30:9.3.3-8.el5" test_ref="oval:org.mitre.oval:tst:33109"/>
            <criterion comment="bind is earlier than 30:9.3.3-8.el5" test_ref="oval:org.mitre.oval:tst:33115"/>
            <criterion comment="bind-libs is earlier than 30:9.3.3-8.el5" test_ref="oval:org.mitre.oval:tst:33331"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11516" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491"/>
        <description>Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:56.006-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:46.505-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:32.530-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11516 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:05.929-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:32.292-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.2.3-6.2" test_ref="oval:org.mitre.oval:tst:32462"/>
            <criterion comment="tkinter is earlier than 0:2.2.3-6.2" test_ref="oval:org.mitre.oval:tst:32283"/>
            <criterion comment="python-tools is earlier than 0:2.2.3-6.2" test_ref="oval:org.mitre.oval:tst:32535"/>
            <criterion comment="python is earlier than 0:2.2.3-6.2" test_ref="oval:org.mitre.oval:tst:32198"/>
            <criterion comment="pcre-devel is earlier than 0:3.9-10.2" test_ref="oval:org.mitre.oval:tst:31703"/>
            <criterion comment="pcre is earlier than 0:3.9-10.2" test_ref="oval:org.mitre.oval:tst:31925"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.3.4-14.2" test_ref="oval:org.mitre.oval:tst:32327"/>
            <criterion comment="python-tools is earlier than 0:2.3.4-14.2" test_ref="oval:org.mitre.oval:tst:32549"/>
            <criterion comment="python is earlier than 0:2.3.4-14.2" test_ref="oval:org.mitre.oval:tst:32523"/>
            <criterion comment="pcre-devel is earlier than 0:4.5-3.2.RHEL4" test_ref="oval:org.mitre.oval:tst:32184"/>
            <criterion comment="python-docs is earlier than 0:2.3.4-14.2" test_ref="oval:org.mitre.oval:tst:31757"/>
            <criterion comment="pcre is earlier than 0:4.5-3.2.RHEL4" test_ref="oval:org.mitre.oval:tst:32077"/>
            <criterion comment="exim-sa is earlier than 0:4.43-1.RHEL4.5" test_ref="oval:org.mitre.oval:tst:31688"/>
            <criterion comment="exim-doc is earlier than 0:4.43-1.RHEL4.5" test_ref="oval:org.mitre.oval:tst:31599"/>
            <criterion comment="tkinter is earlier than 0:2.3.4-14.2" test_ref="oval:org.mitre.oval:tst:32020"/>
            <criterion comment="exim is earlier than 0:4.43-1.RHEL4.5" test_ref="oval:org.mitre.oval:tst:31631"/>
            <criterion comment="exim-mon is earlier than 0:4.43-1.RHEL4.5" test_ref="oval:org.mitre.oval:tst:31475"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11510" version="5" class="vulnerability">
      <metadata>
        <title>The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0242"/>
        <description>The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:35.629-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:45.671-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:31.665-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11510 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:51.909-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:31.060-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="qt-config is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:34921"/>
            <criterion comment="qt is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:35117"/>
            <criterion comment="qt-devel is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:35255"/>
            <criterion comment="qt-MySQL is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:35041"/>
            <criterion comment="qt-ODBC is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:34922"/>
            <criterion comment="qt-designer is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:35004"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="qt-config is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35085"/>
            <criterion comment="qt is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35125"/>
            <criterion comment="qt-MySQL is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:34568"/>
            <criterion comment="qt-ODBC is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:34886"/>
            <criterion comment="qt-designer is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35054"/>
            <criterion comment="qt-devel is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35050"/>
            <criterion comment="qt-PostgreSQL is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35175"/>
            <criterion comment="kdelibs is earlier than 6:3.3.1-9.el4" test_ref="oval:org.mitre.oval:tst:35165"/>
            <criterion comment="kdelibs-devel is earlier than 6:3.3.1-9.el4" test_ref="oval:org.mitre.oval:tst:35252"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="qt-config is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:34806"/>
            <criterion comment="qt is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:34816"/>
            <criterion comment="qt-MySQL is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:34466"/>
            <criterion comment="kdelibs-apidocs is earlier than 6:3.5.4-13.el5" test_ref="oval:org.mitre.oval:tst:35316"/>
            <criterion comment="qt-ODBC is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:35271"/>
            <criterion comment="qt-designer is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:34736"/>
            <criterion comment="qt-devel is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:35097"/>
            <criterion comment="qt-PostgreSQL is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:35149"/>
            <criterion comment="kdelibs is earlier than 6:3.5.4-13.el5" test_ref="oval:org.mitre.oval:tst:35293"/>
            <criterion comment="qt-devel-docs is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:35114"/>
            <criterion comment="kdelibs-devel is earlier than 6:3.5.4-13.el5" test_ref="oval:org.mitre.oval:tst:34994"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11508" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the HTTP dissector for Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted chunked messages.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117"/>
        <description>Unspecified vulnerability in the HTTP dissector for Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted chunked messages.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:26.630-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:44.930-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:30.922-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11508 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:04.729-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:30.004-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:36051"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:35980"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35669"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:35709"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:36120"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35712"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35801"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11507" version="5" class="vulnerability">
      <metadata>
        <title>lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1270"/>
        <description>lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:28.598-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:44.661-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:30.566-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11507 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:24.982-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:29.604-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.22" test_ref="oval:org.mitre.oval:tst:30882"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.22" test_ref="oval:org.mitre.oval:tst:31108"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.22" test_ref="oval:org.mitre.oval:tst:31170"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:30919"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:31056"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:31093"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11503" version="5" class="vulnerability">
      <metadata>
        <title>The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1073"/>
        <description>The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:52.963-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:43.355-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:29.194-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11503 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:29.572-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:28.779-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31148"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31473"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31178"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31282"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31565"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31562"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31582"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:30730"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31534"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11502" version="5" class="vulnerability">
      <metadata>
        <title>The crypt_gensalt functions for BSDI-style extended DES-based and FreeBSD-sytle MD5-based password hashes in crypt_blowfish 0.4.7 and earlier do not evenly and randomly distribute salts, which makes it easier for attackers to guess passwords from a stolen password file due to the increased number of collisions.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0591"/>
        <description>The crypt_gensalt functions for BSDI-style extended DES-based and FreeBSD-sytle MD5-based password hashes in crypt_blowfish 0.4.7 and earlier do not evenly and randomly distribute salts, which makes it easier for attackers to guess passwords from a stolen password file due to the increased number of collisions.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:39.701-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:42.844-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:28.674-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11502 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:19.682-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:28.194-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32465"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32618"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32497"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32527"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32392"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32719"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32621"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32195"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32628"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:32601"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.15-2" test_ref="oval:org.mitre.oval:tst:31936"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32101"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31976"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32564"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32038"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32648"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31768"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32626"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31950"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32604"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32472"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.13-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32278"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11501" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801"/>
        <description>Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:37.159-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:42.349-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:28.168-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11501 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:34.528-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:27.377-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32342"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32877"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:31982"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32816"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32080"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32904"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32915"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32822"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32555"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11497" version="5" class="vulnerability">
      <metadata>
        <title>Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459"/>
        <description>Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:08.733-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:41.385-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:27.301-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11497 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:40.883-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:26.186-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:32819"/>
            <criterion comment="libtiff is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32069"/>
            <criterion comment="kdegraphics is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:33012"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32843"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32922"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32413"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11496" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747"/>
        <description>Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:00.103-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:40.825-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:26.707-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11496 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:03.257-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:25.491-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32940"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33113"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32275"/>
            <criterion comment="seamonkey is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33128"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32259"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32596"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33188"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32780"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33131"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33022"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.5.el4" test_ref="oval:org.mitre.oval:tst:33198"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33241"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33268"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.8-0.1.el4" test_ref="oval:org.mitre.oval:tst:33216"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32752"/>
            <criterion comment="seamonkey is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32536"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32857"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.5.el4" test_ref="oval:org.mitre.oval:tst:33185"/>
            <criterion comment="firefox is earlier than 0:1.5.0.8-0.1.el4" test_ref="oval:org.mitre.oval:tst:33140"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33088"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33118"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33171"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32856"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33214"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11494" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unknown vulnerabilities in the (1) WSP, (2) BER, (3) SMB, (4) NDPS, (5) IAX2, (6) RADIUS, (7) TCAP, (8) MRDISC, (9) 802.3 Slow, (10) SMBMailslot, or (11) SMB PIPE dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (assert error).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1459"/>
        <description>Multiple unknown vulnerabilities in the (1) WSP, (2) BER, (3) SMB, (4) NDPS, (5) IAX2, (6) RADIUS, (7) TCAP, (8) MRDISC, (9) 802.3 Slow, (10) SMBMailslot, or (11) SMB PIPE dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (assert error).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:18.401-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:40.580-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:26.356-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11494 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:09.979-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:25.109-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11489" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327"/>
        <description>Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:57.905-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:39.690-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:24.981-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11489 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:55.736-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:24.604-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.5.7-31.el3" test_ref="oval:org.mitre.oval:tst:37373"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-31.el3" test_ref="oval:org.mitre.oval:tst:37614"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-12.el4_7.2" test_ref="oval:org.mitre.oval:tst:37555"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-12.el4_7.2" test_ref="oval:org.mitre.oval:tst:37573"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.8.2-7.el5_2.2" test_ref="oval:org.mitre.oval:tst:37340"/>
            <criterion comment="libtiff-devel is earlier than 0:3.8.2-7.el5_2.2" test_ref="oval:org.mitre.oval:tst:37515"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11487" version="5" class="vulnerability">
      <metadata>
        <title>The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c; and other vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833"/>
        <description>The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c; and other vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:49.877-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:39.172-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:24.456-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11487 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:35:00.282-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:23.851-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38336"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38452"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38736"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38742"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38069"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38264"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38724"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38791"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38432"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:37902"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38793"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-23.el4" test_ref="oval:org.mitre.oval:tst:38562"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38213"/>
            <criterion comment="firefox is earlier than 0:3.0.11-4.el4" test_ref="oval:org.mitre.oval:tst:38689"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38280"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38531"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38828"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38655"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38771"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38371"/>
            <criterion comment="firefox is earlier than 0:3.0.11-2.el5_3" test_ref="oval:org.mitre.oval:tst:38682"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.22-2.el5_3" test_ref="oval:org.mitre.oval:tst:38801"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38718"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11486" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun Rasterfile (bitmap) images that trigger heap-based buffer overflows.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3744"/>
        <description>Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun Rasterfile (bitmap) images that trigger heap-based buffer overflows.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:41.145-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:38.803-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:24.130-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11486 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:22.428-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:23.404-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32037"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32699"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32588"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32852"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32735"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32383"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32971"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32748"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32946"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32537"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11483" version="5" class="vulnerability">
      <metadata>
        <title>pam_console does not properly restore ownership for certain console devices when there are multiple users logged into the console and one user logs out, which might allow local users to gain privileges.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1716"/>
        <description>pam_console does not properly restore ownership for certain console devices when there are multiple users logged into the console and one user logs out, which might allow local users to gain privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:53.432-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:37.779-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:23.001-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11483 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:29.341-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:21.777-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="pam-devel is earlier than 0:0.75-72" test_ref="oval:org.mitre.oval:tst:34483"/>
            <criterion comment="pam is earlier than 0:0.75-72" test_ref="oval:org.mitre.oval:tst:34274"/>
            <criterion comment="mkisofs is earlier than 8:2.01.0.a32-0.EL3.6" test_ref="oval:org.mitre.oval:tst:34392"/>
            <criterion comment="cdrecord is earlier than 8:2.01.0.a32-0.EL3.6" test_ref="oval:org.mitre.oval:tst:34405"/>
            <criterion comment="cdrtools is earlier than 8:2.01.0.a32-0.EL3.6" test_ref="oval:org.mitre.oval:tst:33947"/>
            <criterion comment="cdrecord-devel is earlier than 8:2.01.0.a32-0.EL3.6" test_ref="oval:org.mitre.oval:tst:34263"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="pam-devel is earlier than 0:0.77-66.23" test_ref="oval:org.mitre.oval:tst:34850"/>
            <criterion comment="pam is earlier than 0:0.77-66.23" test_ref="oval:org.mitre.oval:tst:34954"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="pam-devel is earlier than 0:0.99.6.2-3.26.el5" test_ref="oval:org.mitre.oval:tst:34670"/>
            <criterion comment="pam is earlier than 0:0.99.6.2-3.26.el5" test_ref="oval:org.mitre.oval:tst:34359"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11482" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 can hide the Window's titlebar when displaying XUL markup language documents, which makes it easier for remote attackers to conduct phishing and spoofing attacks by setting the hidechrome attribute.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5334"/>
        <description>Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 can hide the Window's titlebar when displaying XUL markup language documents, which makes it easier for remote attackers to conduct phishing and spoofing attacks by setting the hidechrome attribute.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:13.871-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:37.252-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:22.467-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11482 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:26.559-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:21.069-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35512"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35540"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35394"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35541"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35553"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35552"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:34924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35155"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35441"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35489"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35324"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.5.el4" test_ref="oval:org.mitre.oval:tst:35240"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35182"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35311"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35454"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.7.el4" test_ref="oval:org.mitre.oval:tst:35398"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35351"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35482"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34790"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35291"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34577"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35262"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35202"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-5.el5" test_ref="oval:org.mitre.oval:tst:35177"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11481" version="5" class="vulnerability">
      <metadata>
        <title>The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3389"/>
        <description>The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:33.771-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:36.742-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:21.962-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11481 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:09.701-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:20.431-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32105"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32433"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32429"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32322"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32301"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32253"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32050"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32261"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32003"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32346"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32114"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32325"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32420"/>
            <criterion comment="php is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32337"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32287"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32016"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32405"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32397"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32321"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32207"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:31926"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11479" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373"/>
        <description>Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:31.547-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:36.394-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:21.612-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11479 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:00.680-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:19.874-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.52" test_ref="oval:org.mitre.oval:tst:36146"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.52" test_ref="oval:org.mitre.oval:tst:36214"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.52" test_ref="oval:org.mitre.oval:tst:36403"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.20.2.el4_6.6" test_ref="oval:org.mitre.oval:tst:36474"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.20.2.el4_6.6" test_ref="oval:org.mitre.oval:tst:35913"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.20.2.el4_6.6" test_ref="oval:org.mitre.oval:tst:36036"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-lpd is earlier than 1:1.2.4-11.14.el5_1.6" test_ref="oval:org.mitre.oval:tst:36593"/>
            <criterion comment="cups-devel is earlier than 1:1.2.4-11.14.el5_1.6" test_ref="oval:org.mitre.oval:tst:36521"/>
            <criterion comment="cups is earlier than 1:1.2.4-11.14.el5_1.6" test_ref="oval:org.mitre.oval:tst:36179"/>
            <criterion comment="cups-libs is earlier than 1:1.2.4-11.14.el5_1.6" test_ref="oval:org.mitre.oval:tst:36567"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11478" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one overflow in the CVS PreservePermissions of rcs.c for CVSD before 1.11.2 allows local users to execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2002-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0844"/>
        <description>Off-by-one overflow in the CVS PreservePermissions of rcs.c for CVSD before 1.11.2 allows local users to execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:47.454-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:36.201-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:21.418-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11478 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:14.101-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:19.610-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="cvs is earlier than 0:1.11.2-14" test_ref="oval:org.mitre.oval:tst:29623"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11477" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2103"/>
        <description>Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:44.885-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:35.943-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:21.191-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11477 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:39.764-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:19.264-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.3.1-0.el3.3" test_ref="oval:org.mitre.oval:tst:32063"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.3.1-0.el4.3" test_ref="oval:org.mitre.oval:tst:31738"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11476" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the SSH dissector in Wireshark (aka Ethereal) 0.9.10 to 0.99.0 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631"/>
        <description>Unspecified vulnerability in the SSH dissector in Wireshark (aka Ethereal) 0.9.10 to 0.99.0 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:09.899-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:35.698-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:20.897-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11476 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:30.727-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:18.827-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32882"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32738"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32917"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32447"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11474" version="5" class="vulnerability">
      <metadata>
        <title>Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1057"/>
        <description>Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:39.894-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:35.415-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:20.609-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11474 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:35:02.744-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:18.451-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32525"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32366"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32381"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32215"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32464"/>
          <criterion comment="kernel is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32288"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:31978"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32438"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32070"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11473" version="5" class="vulnerability">
      <metadata>
        <title>fs/exec.c in Linux 2.6, when one thread is tracing another thread that shares the same memory map, might allow local users to cause a denial of service (deadlock) by forcing a core dump when the traced thread is in the TASK_TRACED state.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3107"/>
        <description>fs/exec.c in Linux 2.6, when one thread is tracing another thread that shares the same memory map, might allow local users to cause a denial of service (deadlock) by forcing a core dump when the traced thread is in the TASK_TRACED state.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:19.325-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:34.978-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:20.214-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11473 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:38.922-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:17.866-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32158"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32589"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32704"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32562"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32078"/>
            <criterion comment="kernel is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32513"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32231"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32097"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32708"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31783"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31876"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31592"/>
            <criterion comment="kernel is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31714"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31522"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31902"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-11.EL" test_ref="oval:org.mitre.oval:tst:31817"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11471" version="5" class="vulnerability">
      <metadata>
        <title>Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4068"/>
        <description>Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:56.709-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:34.358-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:19.104-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11471 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:45.304-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:17.015-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-16.el4" test_ref="oval:org.mitre.oval:tst:37634"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el4" test_ref="oval:org.mitre.oval:tst:37195"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37248"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37486"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37495"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37044"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.17-1.el5" test_ref="oval:org.mitre.oval:tst:37230"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37578"/>
            <criterion comment="yelp is earlier than 0:2.16.0-21.el5" test_ref="oval:org.mitre.oval:tst:37584"/>
            <criterion comment="devhelp is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37353"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37406"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el5" test_ref="oval:org.mitre.oval:tst:37225"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:36664"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37664"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11470" version="5" class="vulnerability">
      <metadata>
        <title>CRLF injection vulnerability in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the sqimap_mailbox_select command, aka "IMAP injection."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0377"/>
        <description>CRLF injection vulnerability in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the sqimap_mailbox_select command, aka "IMAP injection."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:44.957-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:34.129-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:18.818-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11470 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:13.503-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:16.657-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.6-5.el3" test_ref="oval:org.mitre.oval:tst:32265"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.6-5.el4" test_ref="oval:org.mitre.oval:tst:32721"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11468" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the predospecial function in dospecial.c in dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote attackers to execute arbitrary code via a crafted DVI file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-0739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0739"/>
        <description>Integer overflow in the predospecial function in dospecial.c in dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote attackers to execute arbitrary code via a crafted DVI file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:39.281-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:33.623-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:18.334-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11468 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:45.677-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:15.964-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:39543"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40329"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40000"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40032"/>
            <criterion comment="tetex-doc is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40150"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40389"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40303"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40444"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40008"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:39920"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40312"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40398"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40122"/>
            <criterion comment="tetex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40413"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11467" version="5" class="vulnerability">
      <metadata>
        <title>mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357"/>
        <description>mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:52.641-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:33.333-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:17.978-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11467 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:49.890-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:15.535-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-56.ent" test_ref="oval:org.mitre.oval:tst:32315"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.46-56.ent" test_ref="oval:org.mitre.oval:tst:32356"/>
            <criterion comment="httpd is earlier than 0:2.0.46-56.ent" test_ref="oval:org.mitre.oval:tst:32098"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-22.ent" test_ref="oval:org.mitre.oval:tst:32426"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-22.ent" test_ref="oval:org.mitre.oval:tst:31907"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-22.ent" test_ref="oval:org.mitre.oval:tst:31584"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.52-22.ent" test_ref="oval:org.mitre.oval:tst:32282"/>
            <criterion comment="httpd is earlier than 0:2.0.52-22.ent" test_ref="oval:org.mitre.oval:tst:32132"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11466" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142"/>
        <description>Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:01.314-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:32.908-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:17.570-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11466 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:16.225-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:14.904-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38704"/>
            <criterion comment="tkinter is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38695"/>
            <criterion comment="python-tools is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38872"/>
            <criterion comment="python is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38617"/>
            <criterion comment="python-docs is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:37965"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38916"/>
            <criterion comment="tkinter is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38703"/>
            <criterion comment="python-tools is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38787"/>
            <criterion comment="python is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38939"/>
            <criterion comment="python-docs is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38081"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38889"/>
            <criterion comment="tkinter is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38958"/>
            <criterion comment="python-tools is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38827"/>
            <criterion comment="python is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38282"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11464" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via an SGI image with malformed Run Length Encoded (RLE) data containing a small image and a large row count.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639"/>
        <description>Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via an SGI image with malformed Run Length Encoded (RLE) data containing a small image and a large row count.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:50.274-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:31.687-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:16.855-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11464 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:31.596-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:13.807-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.54" test_ref="oval:org.mitre.oval:tst:37294"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.54" test_ref="oval:org.mitre.oval:tst:37772"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.54" test_ref="oval:org.mitre.oval:tst:37394"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.1" test_ref="oval:org.mitre.oval:tst:37546"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.1" test_ref="oval:org.mitre.oval:tst:37714"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.1" test_ref="oval:org.mitre.oval:tst:37699"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-lpd is earlier than 1:1.2.4-11.18.el5_2.2" test_ref="oval:org.mitre.oval:tst:37215"/>
            <criterion comment="cups-devel is earlier than 1:1.2.4-11.18.el5_2.2" test_ref="oval:org.mitre.oval:tst:37378"/>
            <criterion comment="cups is earlier than 1:1.2.4-11.18.el5_2.2" test_ref="oval:org.mitre.oval:tst:37794"/>
            <criterion comment="cups-libs is earlier than 1:1.2.4-11.18.el5_2.2" test_ref="oval:org.mitre.oval:tst:37702"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11463" version="5" class="vulnerability">
      <metadata>
        <title>Vixie Cron before 4.1-r10 on Gentoo Linux is installed with insecure permissions, which allows local users to cause a denial of service (cron failure) by creating hard links, which results in a failed st_nlink check in database.c.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1856"/>
        <description>Vixie Cron before 4.1-r10 on Gentoo Linux is installed with insecure permissions, which allows local users to cause a denial of service (cron failure) by creating hard links, which results in a failed st_nlink check in database.c.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:25.917-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:31.425-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:16.591-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11463 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:17.997-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:13.362-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="vixie-cron is earlier than 0:4.1-19.EL3" test_ref="oval:org.mitre.oval:tst:33912"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="vixie-cron is earlier than 4:4.1-47.EL4" test_ref="oval:org.mitre.oval:tst:33630"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="vixie-cron is earlier than 4:4.1-70.el5" test_ref="oval:org.mitre.oval:tst:34161"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11462" version="5" class="vulnerability">
      <metadata>
        <title>Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0564"/>
        <description>Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:44.514-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:31.134-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:16.187-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11462 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:50.312-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:12.944-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30703"/>
          <criterion comment="mozilla is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30682"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:29813"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:29961"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30646"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30390"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30528"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30482"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.2-3.0.2" test_ref="oval:org.mitre.oval:tst:30659"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11459" version="5" class="vulnerability">
      <metadata>
        <title>XScreenSaver 4.10, when using a remote directory service for credentials, does not properly handle the results from the getpwuid function in drivers/lock.c when there is no network connectivity, which causes XScreenSaver to crash and unlock the screen and allows local users to bypass authentication.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1859"/>
        <description>XScreenSaver 4.10, when using a remote directory service for credentials, does not properly handle the results from the getpwuid function in drivers/lock.c when there is no network connectivity, which causes XScreenSaver to crash and unlock the screen and allows local users to bypass authentication.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:22.739-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:30.869-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:15.911-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11459 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:23.190-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:12.417-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xscreensaver is earlier than 1:4.10-21.el3" test_ref="oval:org.mitre.oval:tst:33474"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="xscreensaver is earlier than 1:4.18-5.rhel4.14" test_ref="oval:org.mitre.oval:tst:33891"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11458" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0488"/>
        <description>Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:50.122-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:30.664-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:15.694-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11458 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:46.966-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:12.127-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-32.ent.3" test_ref="oval:org.mitre.oval:tst:30694"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-32.ent.3" test_ref="oval:org.mitre.oval:tst:30285"/>
          <criterion comment="httpd is earlier than 0:2.0.46-32.ent.3" test_ref="oval:org.mitre.oval:tst:30628"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11455" version="5" class="vulnerability">
      <metadata>
        <title>mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3739"/>
        <description>mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:57.557-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:29.509-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:14.502-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11455 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:11.117-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:10.320-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35660"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35620"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35663"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35627"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35653"/>
            <criterion comment="kernel is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35769"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35035"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:35699"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-53.EL" test_ref="oval:org.mitre.oval:tst:34809"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34864"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35017"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35145"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34442"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35258"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35254"/>
            <criterion comment="kernel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35373"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34480"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34911"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:34923"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-55.0.12.EL" test_ref="oval:org.mitre.oval:tst:35327"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34804"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34557"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34837"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34795"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34562"/>
            <criterion comment="kernel is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34357"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34379"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34873"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34870"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34374"/>
            <criterion comment="kernel-debuginfo-common is earlier than 0:2.6.18-8.1.10.el5" test_ref="oval:org.mitre.oval:tst:34337"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11454" version="5" class="vulnerability">
      <metadata>
        <title>The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969"/>
        <description>The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:02.259-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:29.213-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:14.201-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11454 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:48.326-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:09.450-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.17" test_ref="oval:org.mitre.oval:tst:32376"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.17" test_ref="oval:org.mitre.oval:tst:32370"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-33.17" test_ref="oval:org.mitre.oval:tst:32357"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-16.22.4" test_ref="oval:org.mitre.oval:tst:32193"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-43.4" test_ref="oval:org.mitre.oval:tst:31576"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-43.4" test_ref="oval:org.mitre.oval:tst:31826"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-43.4" test_ref="oval:org.mitre.oval:tst:32196"/>
            <criterion comment="openssl096b is earlier than 0:0.9.6b-22.4" test_ref="oval:org.mitre.oval:tst:32241"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11453" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in Xiph.Org libvorbis before 1.2.0 allow context-dependent attackers to cause a denial of service or have other unspecified impact via a crafted OGG file, aka trac Changesets 13162, 13168, 13169, 13170, 13172, 13211, and 13215, as demonstrated by an overflow in oggenc.exe related to the _psy_noiseguards_8 array.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066"/>
        <description>Multiple buffer overflows in Xiph.Org libvorbis before 1.2.0 allow context-dependent attackers to cause a denial of service or have other unspecified impact via a crafted OGG file, aka trac Changesets 13162, 13168, 13169, 13170, 13172, 13211, and 13215, as demonstrated by an overflow in oggenc.exe related to the _psy_noiseguards_8 array.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:26.945-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:28.887-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:13.485-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11453 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:51.949-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:08.930-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.0-8.el3" test_ref="oval:org.mitre.oval:tst:35005"/>
            <criterion comment="libvorbis is earlier than 1:1.0-8.el3" test_ref="oval:org.mitre.oval:tst:35016"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.0-2.el4.5" test_ref="oval:org.mitre.oval:tst:34951"/>
            <criterion comment="libvorbis is earlier than 1:1.1.0-2.el4.5" test_ref="oval:org.mitre.oval:tst:34625"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.2-3.el5.0" test_ref="oval:org.mitre.oval:tst:35046"/>
            <criterion comment="libvorbis is earlier than 1:1.1.2-3.el5.0" test_ref="oval:org.mitre.oval:tst:34551"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11452" version="5" class="vulnerability">
      <metadata>
        <title>The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2088"/>
        <description>The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:46.366-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:28.601-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:13.179-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11452 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:17.205-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:08.508-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-46.2.ent" test_ref="oval:org.mitre.oval:tst:31786"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.46-46.2.ent" test_ref="oval:org.mitre.oval:tst:31975"/>
            <criterion comment="httpd is earlier than 0:2.0.46-46.2.ent" test_ref="oval:org.mitre.oval:tst:31650"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:31790"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:31890"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:31948"/>
            <criterion comment="mod_ssl is earlier than 1:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:31906"/>
            <criterion comment="httpd is earlier than 0:2.0.52-12.1.ent" test_ref="oval:org.mitre.oval:tst:32146"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11449" version="5" class="vulnerability">
      <metadata>
        <title>lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c.  NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106"/>
        <description>lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c.  NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:08.943-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:27.632-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:12.181-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11449 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:47.447-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:07.087-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.0-8.el3" test_ref="oval:org.mitre.oval:tst:35005"/>
            <criterion comment="libvorbis is earlier than 1:1.0-8.el3" test_ref="oval:org.mitre.oval:tst:35016"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.0-2.el4.5" test_ref="oval:org.mitre.oval:tst:34951"/>
            <criterion comment="libvorbis is earlier than 1:1.1.0-2.el4.5" test_ref="oval:org.mitre.oval:tst:34625"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.2-3.el5.0" test_ref="oval:org.mitre.oval:tst:35046"/>
            <criterion comment="libvorbis is earlier than 1:1.1.2-3.el5.0" test_ref="oval:org.mitre.oval:tst:34551"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11448" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail 1.4.0 through 1.4.9a allows remote attackers to send e-mails from arbitrary users via certain data in the SRC attribute of an IMG element.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2589"/>
        <description>Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail 1.4.0 through 1.4.9a allows remote attackers to send e-mails from arbitrary users via certain data in the SRC attribute of an IMG element.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:41.401-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:27.378-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:11.881-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11448 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:37.375-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:06.581-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-6.el3" test_ref="oval:org.mitre.oval:tst:33850"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-4.0.1.el4" test_ref="oval:org.mitre.oval:tst:33871"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-4.0.1.el5" test_ref="oval:org.mitre.oval:tst:34227"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11446" version="5" class="vulnerability">
      <metadata>
        <title>SQL injection vulnerability in SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL statements, with unknown impact, probably via abook_database.php.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0521"/>
        <description>SQL injection vulnerability in SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL statements, with unknown impact, probably via abook_database.php.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:56.419-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:27.203-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:11.688-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11446 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:38.519-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:06.298-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="squirrelmail is earlier than 0:1.4.3-0.e3.1" test_ref="oval:org.mitre.oval:tst:29772"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11445" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600"/>
        <description>Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:44.723-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:26.952-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:11.459-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11445 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:51.618-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:05.944-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="samba-common is earlier than 0:3.0.4-6.3E" test_ref="oval:org.mitre.oval:tst:30711"/>
          <criterion comment="samba-swat is earlier than 0:3.0.4-6.3E" test_ref="oval:org.mitre.oval:tst:30328"/>
          <criterion comment="samba-client is earlier than 0:3.0.4-6.3E" test_ref="oval:org.mitre.oval:tst:30674"/>
          <criterion comment="samba is earlier than 0:3.0.4-6.3E" test_ref="oval:org.mitre.oval:tst:30601"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11443" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5, when running on Linux systems with gnome-vfs support, might allow remote attackers to read arbitrary files on SSH/sftp servers that accept key authentication by creating a web page on the target server, in which the web page contains URIs with (1) smb: or (2) sftp: schemes that access other files from the server.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5337"/>
        <description>Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5, when running on Linux systems with gnome-vfs support, might allow remote attackers to read arbitrary files on SSH/sftp servers that accept key authentication by creating a web page on the target server, in which the web page contains URIs with (1) smb: or (2) sftp: schemes that access other files from the server.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:00.169-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:26.137-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:10.659-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11443 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:42.239-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:04.901-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35512"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35540"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35394"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35541"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35553"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35552"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:34924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35155"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35441"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35489"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35324"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.5.el4" test_ref="oval:org.mitre.oval:tst:35240"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35182"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35311"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35454"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.7.el4" test_ref="oval:org.mitre.oval:tst:35398"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35351"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35482"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34790"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35291"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34577"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35262"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35202"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-5.el5" test_ref="oval:org.mitre.oval:tst:35177"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11442" version="5" class="vulnerability">
      <metadata>
        <title>The RPL dissector in Wireshark (formerly Ethereal) 0.9.8 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450"/>
        <description>The RPL dissector in Wireshark (formerly Ethereal) 0.9.8 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:48.565-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:25.728-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:10.279-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11442 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:33.996-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:04.349-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:36051"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:35980"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35669"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:35709"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:36120"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35712"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35801"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11440" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193"/>
        <description>Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:43.505-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:25.001-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:09.546-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11440 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:07.128-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:03.402-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32436"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32311"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32279"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.34" test_ref="oval:org.mitre.oval:tst:32490"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32507"/>
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.34" test_ref="oval:org.mitre.oval:tst:32463"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32377"/>
            <criterion comment="xpdf is earlier than 1:2.02-9.8" test_ref="oval:org.mitre.oval:tst:31474"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:31613"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.34" test_ref="oval:org.mitre.oval:tst:31538"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32260"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:32395"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32095"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:31805"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32489"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.9" test_ref="oval:org.mitre.oval:tst:31551"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32199"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.3" test_ref="oval:org.mitre.oval:tst:32230"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.9" test_ref="oval:org.mitre.oval:tst:32368"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32308"/>
            <criterion comment="xpdf is earlier than 1:3.00-11.10" test_ref="oval:org.mitre.oval:tst:32152"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32333"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32317"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.9" test_ref="oval:org.mitre.oval:tst:32431"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11436" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in xpcom/io/nsEscape.cpp in the browser engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017"/>
        <description>Integer overflow in xpcom/io/nsEscape.cpp in the browser engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:02.186-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:24.071-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:08.543-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11436 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:01.656-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:01.894-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-17.el4" test_ref="oval:org.mitre.oval:tst:37872"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.18-1.el5" test_ref="oval:org.mitre.oval:tst:38015"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11433" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser's content pane.  NOTE: this issue can be leveraged for phishing and other attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2871"/>
        <description>Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser's content pane.  NOTE: this issue can be leveraged for phishing and other attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:41.326-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:23.152-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:07.638-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11433 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:17.849-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:01.113-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34409"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34257"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34432"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33988"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33721"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33693"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34313"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34281"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33894"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34228"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:33625"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33931"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33844"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.1.el4" test_ref="oval:org.mitre.oval:tst:34331"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34334"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34021"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34249"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:34293"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.1.el4" test_ref="oval:org.mitre.oval:tst:34371"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34446"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34262"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34366"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33994"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34322"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:34445"/>
            <criterion comment="yelp is earlier than 0:2.16.0-15.el5" test_ref="oval:org.mitre.oval:tst:33445"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-11.el5" test_ref="oval:org.mitre.oval:tst:34323"/>
            <criterion comment="devhelp is earlier than 0:0.12-11.el5" test_ref="oval:org.mitre.oval:tst:34204"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:34162"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:33979"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11431" version="5" class="vulnerability">
      <metadata>
        <title>The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1562"/>
        <description>The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:34.326-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:22.247-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:06.767-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11431 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:50.478-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:14:00.295-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34409"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34257"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34432"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33988"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33721"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33693"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34313"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34281"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33894"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34228"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:33625"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33931"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33844"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34334"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34021"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34249"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:34293"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.1.el4" test_ref="oval:org.mitre.oval:tst:34371"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34446"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34262"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34366"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33994"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34322"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:34445"/>
            <criterion comment="yelp is earlier than 0:2.16.0-15.el5" test_ref="oval:org.mitre.oval:tst:33445"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-11.el5" test_ref="oval:org.mitre.oval:tst:34323"/>
            <criterion comment="devhelp is earlier than 0:0.12-11.el5" test_ref="oval:org.mitre.oval:tst:34204"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:34162"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11425" version="5" class="vulnerability">
      <metadata>
        <title>backend/parser/analyze.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via certain aggregate functions in an UPDATE statement, which are not properly handled during a "MIN/MAX index optimization."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5540"/>
        <description>backend/parser/analyze.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via certain aggregate functions in an UPDATE statement, which are not properly handled during a "MIN/MAX index optimization."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:11.954-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:21.124-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:05.187-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11425 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:07.495-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:58.930-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33558"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33220"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33285"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33432"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33464"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33104"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33317"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33537"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33539"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33243"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.18-1" test_ref="oval:org.mitre.oval:tst:33246"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33442"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33531"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33065"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:32982"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33144"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33007"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33534"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33427"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33173"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33069"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.16-1.RHEL4.1" test_ref="oval:org.mitre.oval:tst:33496"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33181"/>
            <criterion comment="postgresql-docs is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33488"/>
            <criterion comment="postgresql-pl is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33593"/>
            <criterion comment="postgresql-tcl is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33121"/>
            <criterion comment="postgresql-libs is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33568"/>
            <criterion comment="postgresql-contrib is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33396"/>
            <criterion comment="postgresql-python is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33603"/>
            <criterion comment="postgresql-test is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:32610"/>
            <criterion comment="postgresql-server is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:32997"/>
            <criterion comment="postgresql-devel is earlier than 0:8.1.8-1.el5" test_ref="oval:org.mitre.oval:tst:33536"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11423" version="5" class="vulnerability">
      <metadata>
        <title>The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503"/>
        <description>The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:51.973-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:20.225-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:04.296-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11423 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:22.808-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:57.693-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38137"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37886"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37999"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37907"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37709"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38092"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37745"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38039"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38062"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38073"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37869"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38071"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-18.el4" test_ref="oval:org.mitre.oval:tst:37200"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37789"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37395"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38118"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37812"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="thunderbird is earlier than 0:2.0.0.19-1.el5_2" test_ref="oval:org.mitre.oval:tst:38053"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11422" version="5" class="vulnerability">
      <metadata>
        <title>OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0239"/>
        <description>OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:06.438-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:18.840-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:02.953-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11422 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:32.472-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:56.246-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-38.2.0.EL3" test_ref="oval:org.mitre.oval:tst:33440"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-38.2.0.EL3" test_ref="oval:org.mitre.oval:tst:33125"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-38.2.0.EL3" test_ref="oval:org.mitre.oval:tst:33421"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.5-10.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33334"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.5-10.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33202"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.5-10.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33265"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.5-10.6.0.EL4" test_ref="oval:org.mitre.oval:tst:33436"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-langpack-sk_SK is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33388"/>
            <criterion comment="openoffice.org-langpack-zu_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33424"/>
            <criterion comment="openoffice.org-langpack-pa_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33485"/>
            <criterion comment="openoffice.org-langpack-hi_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33323"/>
            <criterion comment="openoffice.org-langpack-et_EE is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33367"/>
            <criterion comment="openoffice.org-langpack-kn_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33452"/>
            <criterion comment="openoffice.org is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33446"/>
            <criterion comment="openoffice.org-langpack-zh_TW is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33301"/>
            <criterion comment="openoffice.org-writer is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33679"/>
            <criterion comment="openoffice.org-langpack-ve_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33157"/>
            <criterion comment="openoffice.org-langpack-ga_IE is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33463"/>
            <criterion comment="openoffice.org-langpack-ta_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33142"/>
            <criterion comment="openoffice.org-langpack-ko_KR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33606"/>
            <criterion comment="openoffice.org-langpack-or_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33009"/>
            <criterion comment="openoffice.org-langpack-da_DK is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33302"/>
            <criterion comment="openoffice.org-langpack-sr_CS is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33387"/>
            <criterion comment="openoffice.org-langpack-pl_PL is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33013"/>
            <criterion comment="openoffice.org-langpack-fr is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33611"/>
            <criterion comment="openoffice.org-langpack-ts_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33638"/>
            <criterion comment="openoffice.org-javafilter is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33048"/>
            <criterion comment="openoffice.org-langpack-as_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33513"/>
            <criterion comment="openoffice.org-testtools is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33756"/>
            <criterion comment="openoffice.org-langpack-hr_HR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33355"/>
            <criterion comment="openoffice.org-langpack-de is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33147"/>
            <criterion comment="openoffice.org-emailmerge is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33448"/>
            <criterion comment="openoffice.org-xsltfilter is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33749"/>
            <criterion comment="openoffice.org-langpack-tn_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33529"/>
            <criterion comment="openoffice.org-langpack-te_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33254"/>
            <criterion comment="openoffice.org-langpack-sv is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33659"/>
            <criterion comment="openoffice.org-base is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33060"/>
            <criterion comment="openoffice.org-langpack-ca_ES is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33039"/>
            <criterion comment="openoffice.org-langpack-nr_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33271"/>
            <criterion comment="openoffice.org-core is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33389"/>
            <criterion comment="openoffice.org-langpack-nl is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33476"/>
            <criterion comment="openoffice.org-langpack-ur is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33477"/>
            <criterion comment="openoffice.org-langpack-nn_NO is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33051"/>
            <criterion comment="openoffice.org-langpack-ar is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33313"/>
            <criterion comment="openoffice.org-langpack-ja_JP is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33511"/>
            <criterion comment="openoffice.org-langpack-gu_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:32740"/>
            <criterion comment="openoffice.org-langpack-tr_TR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33552"/>
            <criterion comment="openoffice.org-langpack-eu_ES is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33490"/>
            <criterion comment="openoffice.org-langpack-fi_FI is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33514"/>
            <criterion comment="openoffice.org-graphicfilter is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33365"/>
            <criterion comment="openoffice.org-pyuno is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33599"/>
            <criterion comment="openoffice.org-langpack-ml_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33533"/>
            <criterion comment="openoffice.org-langpack-gl_ES is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33023"/>
            <criterion comment="openoffice.org-langpack-zh_CN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33160"/>
            <criterion comment="openoffice.org-langpack-xh_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33553"/>
            <criterion comment="openoffice.org-langpack-it is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33401"/>
            <criterion comment="openoffice.org-langpack-es is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33480"/>
            <criterion comment="openoffice.org-langpack-nb_NO is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33168"/>
            <criterion comment="openoffice.org-langpack-sl_SI is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33643"/>
            <criterion comment="openoffice.org-draw is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33451"/>
            <criterion comment="openoffice.org-langpack-nso_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33201"/>
            <criterion comment="openoffice.org-langpack-ms_MY is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33486"/>
            <criterion comment="openoffice.org-langpack-el_GR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:32762"/>
            <criterion comment="openoffice.org-langpack-hu_HU is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33450"/>
            <criterion comment="openoffice.org-langpack-ss_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33579"/>
            <criterion comment="openoffice.org-langpack-bn is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33544"/>
            <criterion comment="openoffice.org-langpack-he_IL is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33358"/>
            <criterion comment="openoffice.org-langpack-pt_PT is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33604"/>
            <criterion comment="openoffice.org-langpack-lt_LT is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33212"/>
            <criterion comment="openoffice.org-langpack-af_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33377"/>
            <criterion comment="openoffice.org-langpack-bg_BG is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33364"/>
            <criterion comment="openoffice.org-calc is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33111"/>
            <criterion comment="openoffice.org-langpack-cs_CZ is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33324"/>
            <criterion comment="openoffice.org-langpack-cy_GB is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33471"/>
            <criterion comment="openoffice.org-langpack-mr_IN is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33420"/>
            <criterion comment="openoffice.org-langpack-th_TH is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33670"/>
            <criterion comment="openoffice.org-langpack-pt_BR is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:32682"/>
            <criterion comment="openoffice.org-langpack-ru is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33543"/>
            <criterion comment="openoffice.org-math is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33517"/>
            <criterion comment="openoffice.org-impress is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33393"/>
            <criterion comment="openoffice.org-langpack-st_ZA is earlier than 1:2.0.4-5.4.17.1" test_ref="oval:org.mitre.oval:tst:33484"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11421" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a "minimal quantifier."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565"/>
        <description>Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a "minimal quantifier."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:00.538-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:18.329-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:02.435-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11421 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:46.294-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:55.523-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32759"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32989"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32809"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32779"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32954"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32668"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33010"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32811"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32981"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33061"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:32072"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33120"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32910"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32677"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32933"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32243"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:33062"/>
            <criterion comment="firefox is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32951"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32978"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33072"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33079"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32121"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33077"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11415" version="5" class="vulnerability">
      <metadata>
        <title>Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446"/>
        <description>Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:35.221-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:16.918-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:10:01.001-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11415 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:30.070-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:53.562-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.9-1.3E.13.2" test_ref="oval:org.mitre.oval:tst:34247"/>
            <criterion comment="samba-swat is earlier than 0:3.0.9-1.3E.13.2" test_ref="oval:org.mitre.oval:tst:33727"/>
            <criterion comment="samba-client is earlier than 0:3.0.9-1.3E.13.2" test_ref="oval:org.mitre.oval:tst:33913"/>
            <criterion comment="samba is earlier than 0:3.0.9-1.3E.13.2" test_ref="oval:org.mitre.oval:tst:33962"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.10-1.4E.12.2" test_ref="oval:org.mitre.oval:tst:34121"/>
            <criterion comment="samba-swat is earlier than 0:3.0.10-1.4E.12.2" test_ref="oval:org.mitre.oval:tst:34199"/>
            <criterion comment="samba-client is earlier than 0:3.0.10-1.4E.12.2" test_ref="oval:org.mitre.oval:tst:34107"/>
            <criterion comment="samba is earlier than 0:3.0.10-1.4E.12.2" test_ref="oval:org.mitre.oval:tst:34156"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.23c-2.el5.2.0.2" test_ref="oval:org.mitre.oval:tst:34266"/>
            <criterion comment="samba-swat is earlier than 0:3.0.23c-2.el5.2.0.2" test_ref="oval:org.mitre.oval:tst:33487"/>
            <criterion comment="samba-client is earlier than 0:3.0.23c-2.el5.2.0.2" test_ref="oval:org.mitre.oval:tst:33303"/>
            <criterion comment="samba is earlier than 0:3.0.23c-2.el5.2.0.2" test_ref="oval:org.mitre.oval:tst:34130"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11408" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748"/>
        <description>Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:58.890-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:14.761-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:58.877-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11408 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:09.436-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:51.881-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32940"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33113"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32275"/>
            <criterion comment="seamonkey is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33128"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32259"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32596"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33188"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:32780"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33131"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.6-0.1.el3" test_ref="oval:org.mitre.oval:tst:33022"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.5.el4" test_ref="oval:org.mitre.oval:tst:33198"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33241"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33268"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.8-0.1.el4" test_ref="oval:org.mitre.oval:tst:33216"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32752"/>
            <criterion comment="seamonkey is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32536"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32857"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.5.el4" test_ref="oval:org.mitre.oval:tst:33185"/>
            <criterion comment="firefox is earlier than 0:1.5.0.8-0.1.el4" test_ref="oval:org.mitre.oval:tst:33140"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33088"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33118"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33171"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:32856"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.6-0.1.el4" test_ref="oval:org.mitre.oval:tst:33214"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11407" version="5" class="vulnerability">
      <metadata>
        <title>Thunderbird 0.6 through 0.9 and Mozilla 1.7 through 1.7.3 does not obey the network.cookie.disableCookieForMailNews preference, which could allow remote attackers bypass the user's intended privacy and security policy by using cookies in e-mail messages.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0149"/>
        <description>Thunderbird 0.6 through 0.9 and Mozilla 1.7 through 1.7.3 does not obey the network.cookie.disableCookieForMailNews preference, which could allow remote attackers bypass the user's intended privacy and security policy by using cookies in e-mail messages.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:52.110-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:14.250-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:58.365-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11407 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:46.940-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:51.247-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:30819"/>
            <criterion comment="mozilla is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31515"/>
            <criterion comment="mozilla-chat is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31278"/>
            <criterion comment="mozilla-mail is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31465"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31606"/>
            <criterion comment="mozilla-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31480"/>
            <criterion comment="mozilla-nss is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31417"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31313"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31469"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31598"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30665"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31499"/>
            <criterion comment="mozilla is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31604"/>
            <criterion comment="thunderbird is earlier than 0:1.0-1.1.EL4" test_ref="oval:org.mitre.oval:tst:31099"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31381"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31622"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30651"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31560"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31110"/>
            <criterion comment="evolution is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31003"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31404"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31375"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31106"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31418"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31558"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11406" version="5" class="vulnerability">
      <metadata>
        <title>The xattr file system code, as backported in Red Hat Enterprise Linux 3 on 64-bit systems, does not properly handle certain offsets, which allows local users to cause a denial of service (system crash) via certain actions on an ext3 file system with extended attributes enabled.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0757"/>
        <description>The xattr file system code, as backported in Red Hat Enterprise Linux 3 on 64-bit systems, does not properly handle certain offsets, which allows local users to cause a denial of service (system crash) via certain actions on an ext3 file system with extended attributes enabled.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:40.872-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:13.890-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:58.074-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11406 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:49.270-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:50.790-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-32.EL" test_ref="oval:org.mitre.oval:tst:31430"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-32.EL" test_ref="oval:org.mitre.oval:tst:31530"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-32.EL" test_ref="oval:org.mitre.oval:tst:31347"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-32.EL" test_ref="oval:org.mitre.oval:tst:31236"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-32.EL" test_ref="oval:org.mitre.oval:tst:31051"/>
          <criterion comment="kernel is earlier than 0:2.4.21-32.EL" test_ref="oval:org.mitre.oval:tst:31597"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-32.EL" test_ref="oval:org.mitre.oval:tst:31518"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-32.EL" test_ref="oval:org.mitre.oval:tst:31511"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-32.EL" test_ref="oval:org.mitre.oval:tst:31413"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11396" version="5" class="vulnerability">
      <metadata>
        <title>The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652"/>
        <description>The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:03.909-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:11.823-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:55.722-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11396 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:15.546-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:48.392-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38597"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38375"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38403"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38521"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38542"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:37726"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38677"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38096"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38577"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38540"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.9-1.el4" test_ref="oval:org.mitre.oval:tst:38379"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38716"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38634"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38190"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38596"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38685"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38697"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38308"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38633"/>
            <criterion comment="firefox is earlier than 0:3.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38370"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38462"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11395" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804"/>
        <description>Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:38.659-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:11.203-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:55.230-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11395 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:28.133-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:47.696-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32342"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32877"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:31982"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32816"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32080"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32904"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32915"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32822"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32555"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11391" version="5" class="vulnerability">
      <metadata>
        <title>The CSSLoaderImpl::DoSheetComplete function in layout/style/nsCSSLoader.cpp in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 changes the case of certain strings in a stylesheet before adding this stylesheet to the XUL cache, which might allow remote attackers to modify the browser's font and other CSS attributes, and potentially disrupt rendering of a web page, by forcing the browser to perform this erroneous stylesheet caching.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-0169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169"/>
        <description>The CSSLoaderImpl::DoSheetComplete function in layout/style/nsCSSLoader.cpp in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 changes the case of certain strings in a stylesheet before adding this stylesheet to the XUL cache, which might allow remote attackers to modify the browser's font and other CSS attributes, and potentially disrupt rendering of a web page, by forcing the browser to perform this erroneous stylesheet caching.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:37.711-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:09.723-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:53.703-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11391 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:33.863-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:45.620-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39910"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40282"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40001"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40160"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39327"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39963"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39749"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40277"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39865"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40145"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40087"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40185"/>
            <criterion comment="firefox is earlier than 0:3.0.18-1.el4" test_ref="oval:org.mitre.oval:tst:39897"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40258"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40130"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40147"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40264"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:39323"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:40174"/>
            <criterion comment="firefox is earlier than 0:3.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:40301"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:39533"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1139" version="1" class="vulnerability">
      <metadata>
        <title>Telnet Client Information Disclosure Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>telnet</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488"/>
        <description>Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-07-11T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-07-27T10:36:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-09-21T01:33:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="telnet RPM earlier than 1:0.17-20.EL3.3" negate="false" test_ref="oval:org.mitre.oval:tst:1131"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/telnet is executable by any user" negate="false" test_ref="oval:org.mitre.oval:tst:1130"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11389" version="5" class="vulnerability">
      <metadata>
        <title>Double free vulnerability in tif_jpeg.c in libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers errors related to "setfield/getfield methods in cleanup functions."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026"/>
        <description>Double free vulnerability in tif_jpeg.c in libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers errors related to "setfield/getfield methods in cleanup functions."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:26.803-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:09.168-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:53.136-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11389 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:51.157-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:44.736-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.5.7-25.el3.1" test_ref="oval:org.mitre.oval:tst:32689"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-25.el3.1" test_ref="oval:org.mitre.oval:tst:32435"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-10" test_ref="oval:org.mitre.oval:tst:32329"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-10" test_ref="oval:org.mitre.oval:tst:32637"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11388" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0010"/>
        <description>Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:08.517-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:08.833-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:52.782-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11388 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:17.373-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:44.372-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30346"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30006"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30702"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30513"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30280"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30056"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30508"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30654"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.EL" test_ref="oval:org.mitre.oval:tst:30307"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11387" version="5" class="vulnerability">
      <metadata>
        <title>Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-5051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051"/>
        <description>Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:09.505-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:08.514-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:52.451-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11387 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:57.937-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:43.866-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssh is earlier than 0:3.6.1p2-33.30.12" test_ref="oval:org.mitre.oval:tst:33091"/>
            <criterion comment="openssh-askpass is earlier than 0:3.6.1p2-33.30.12" test_ref="oval:org.mitre.oval:tst:33089"/>
            <criterion comment="openssh-server is earlier than 0:3.6.1p2-33.30.12" test_ref="oval:org.mitre.oval:tst:32651"/>
            <criterion comment="openssh-clients is earlier than 0:3.6.1p2-33.30.12" test_ref="oval:org.mitre.oval:tst:32799"/>
            <criterion comment="openssh-askpass-gnome is earlier than 0:3.6.1p2-33.30.12" test_ref="oval:org.mitre.oval:tst:32173"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssh is earlier than 0:3.9p1-8.RHEL4.17" test_ref="oval:org.mitre.oval:tst:32994"/>
            <criterion comment="openssh-askpass is earlier than 0:3.9p1-8.RHEL4.17" test_ref="oval:org.mitre.oval:tst:32813"/>
            <criterion comment="openssh-server is earlier than 0:3.9p1-8.RHEL4.17" test_ref="oval:org.mitre.oval:tst:33151"/>
            <criterion comment="openssh-clients is earlier than 0:3.9p1-8.RHEL4.17" test_ref="oval:org.mitre.oval:tst:33040"/>
            <criterion comment="openssh-askpass-gnome is earlier than 0:3.9p1-8.RHEL4.17" test_ref="oval:org.mitre.oval:tst:33167"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11385" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0587"/>
        <description>Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:45.842-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:07.627-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:51.558-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11385 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:43.752-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:42.259-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution is earlier than 0:1.4.5-25.el3" test_ref="oval:org.mitre.oval:tst:38285"/>
            <criterion comment="evolution-devel is earlier than 0:1.4.5-25.el3" test_ref="oval:org.mitre.oval:tst:38422"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution28-evolution-data-server-devel is earlier than 0:1.8.0-37.el4_7.2" test_ref="oval:org.mitre.oval:tst:38140"/>
            <criterion comment="evolution-data-server-devel is earlier than 0:1.0.2-14.el4_7.1" test_ref="oval:org.mitre.oval:tst:38464"/>
            <criterion comment="evolution-data-server is earlier than 0:1.0.2-14.el4_7.1" test_ref="oval:org.mitre.oval:tst:38477"/>
            <criterion comment="evolution is earlier than 0:2.0.2-41.el4_7.2" test_ref="oval:org.mitre.oval:tst:38489"/>
            <criterion comment="evolution28-evolution-data-server is earlier than 0:1.8.0-37.el4_7.2" test_ref="oval:org.mitre.oval:tst:38193"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-41.el4_7.2" test_ref="oval:org.mitre.oval:tst:38059"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="evolution-data-server-devel is earlier than 0:1.12.3-10.el5_3.3" test_ref="oval:org.mitre.oval:tst:38514"/>
            <criterion comment="evolution-data-server is earlier than 0:1.12.3-10.el5_3.3" test_ref="oval:org.mitre.oval:tst:37983"/>
            <criterion comment="evolution-data-server-doc is earlier than 0:1.12.3-10.el5_3.3" test_ref="oval:org.mitre.oval:tst:37891"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11384" version="5" class="vulnerability">
      <metadata>
        <title>A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1068"/>
        <description>A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:57.745-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:07.335-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:51.268-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11384 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:34.161-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:41.688-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30934"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30708"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30577"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30874"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30794"/>
          <criterion comment="kernel is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30892"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30873"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:31080"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30866"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11383" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via byte order mark (BOM) characters that are removed from JavaScript code before execution, aka "Stripped BOM characters bug."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4065"/>
        <description>Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via byte order mark (BOM) characters that are removed from JavaScript code before execution, aka "Stripped BOM characters bug."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:00.449-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:06.656-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:50.610-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11383 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:23.810-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:40.733-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-16.el4" test_ref="oval:org.mitre.oval:tst:37634"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el4" test_ref="oval:org.mitre.oval:tst:37195"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37248"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37486"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37495"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37044"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.17-1.el5" test_ref="oval:org.mitre.oval:tst:37230"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37578"/>
            <criterion comment="yelp is earlier than 0:2.16.0-21.el5" test_ref="oval:org.mitre.oval:tst:37584"/>
            <criterion comment="devhelp is earlier than 0:0.12-19.el5" test_ref="oval:org.mitre.oval:tst:37353"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.2-5.el5" test_ref="oval:org.mitre.oval:tst:37406"/>
            <criterion comment="firefox is earlier than 0:3.0.2-3.el5" test_ref="oval:org.mitre.oval:tst:37225"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:36664"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-1.el5" test_ref="oval:org.mitre.oval:tst:37664"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11382" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup.  NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox.  Also, it has been independently reported that Netscape 8.1 does not have this issue.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-4134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134"/>
        <description>Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup.  NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox.  Also, it has been independently reported that Netscape 8.1 does not have this issue.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:44.003-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:06.197-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:50.142-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11382 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:29.602-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:40.132-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32492"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32486"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32176"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31856"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32548"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31980"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32519"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:32478"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31709"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31881"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32504"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32502"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:31570"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:31656"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32458"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32216"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32359"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32540"/>
            <criterion comment="firefox is earlier than 0:1.0.7-1.4.3" test_ref="oval:org.mitre.oval:tst:32384"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32647"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.4.2" test_ref="oval:org.mitre.oval:tst:32454"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11381" version="5" class="vulnerability">
      <metadata>
        <title>Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0007"/>
        <description>Unknown vulnerability in the DLSw dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (application crash from assertion).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:01.737-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:05.914-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:49.837-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11381 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:39.522-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:39.724-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31265"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31218"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31097"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31103"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11380" version="5" class="vulnerability">
      <metadata>
        <title>The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0786"/>
        <description>The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:28.807-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:05.711-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:49.620-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11380 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:35.678-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:39.431-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30894"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30928"/>
          <criterion comment="httpd is earlier than 0:2.0.46-40.ent" test_ref="oval:org.mitre.oval:tst:30979"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11379" version="5" class="vulnerability">
      <metadata>
        <title>libpurple/protocols/irc/msgs.c in the IRC protocol plugin in libpurple in Pidgin before 2.6.2 allows remote IRC servers to cause a denial of service (NULL pointer dereference and application crash) via a TOPIC message that lacks a topic string.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703"/>
        <description>libpurple/protocols/irc/msgs.c in the IRC protocol plugin in libpurple in Pidgin before 2.6.2 allows remote IRC servers to cause a denial of service (NULL pointer dereference and application crash) via a TOPIC message that lacks a topic string.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:40.168-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:05.238-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:49.160-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11379 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:31.889-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:38.745-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="pidgin is earlier than 0:1.5.1-6.el3" test_ref="oval:org.mitre.oval:tst:39353"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="finch-devel is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39474"/>
            <criterion comment="libpurple is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39423"/>
            <criterion comment="libpurple-perl is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39307"/>
            <criterion comment="libpurple-tcl is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39264"/>
            <criterion comment="pidgin-devel is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39332"/>
            <criterion comment="libpurple-devel is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39395"/>
            <criterion comment="finch is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39376"/>
            <criterion comment="pidgin-perl is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39381"/>
            <criterion comment="pidgin is earlier than 0:2.6.2-2.el4" test_ref="oval:org.mitre.oval:tst:39450"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="finch-devel is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39246"/>
            <criterion comment="libpurple is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39428"/>
            <criterion comment="libpurple-perl is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39414"/>
            <criterion comment="libpurple-tcl is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39006"/>
            <criterion comment="pidgin-devel is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:38683"/>
            <criterion comment="libpurple-devel is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39404"/>
            <criterion comment="finch is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39139"/>
            <criterion comment="pidgin-perl is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39341"/>
            <criterion comment="pidgin is earlier than 0:2.6.2-2.el5" test_ref="oval:org.mitre.oval:tst:39169"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11378" version="5" class="vulnerability">
      <metadata>
        <title>The SCTP dissector in Wireshark (formerly Ethereal) 0.99.5 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070"/>
        <description>The SCTP dissector in Wireshark (formerly Ethereal) 0.99.5 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:08.857-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:04.888-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:48.823-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11378 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:40.456-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:38.251-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37624"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37249"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37725"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37542"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37460"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11377" version="5" class="vulnerability">
      <metadata>
        <title>The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local files via vectors related to handling of zoneinfo (aka tz) files, aka Bug Id 6824265.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0399"/>
        <description>Heap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:21.170-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:04.374-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:48.302-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11377 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:18.928-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:37.578-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:30819"/>
            <criterion comment="mozilla is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31515"/>
            <criterion comment="mozilla-chat is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31278"/>
            <criterion comment="mozilla-mail is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31465"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31606"/>
            <criterion comment="mozilla-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31480"/>
            <criterion comment="mozilla-nss is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31417"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31313"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31469"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31598"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-chat is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31381"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31110"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31375"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31106"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31418"/>
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30665"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31499"/>
            <criterion comment="mozilla is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31604"/>
            <criterion comment="thunderbird is earlier than 0:1.0.2-1.4.1" test_ref="oval:org.mitre.oval:tst:31382"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31622"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30651"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31560"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31404"/>
            <criterion comment="evolution is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31003"/>
            <criterion comment="firefox is earlier than 0:1.0.2-1.4.1" test_ref="oval:org.mitre.oval:tst:31302"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31558"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11376" version="5" class="vulnerability">
      <metadata>
        <title>The arrayShrink function (lib/Array.c) in Squid 2.6.STABLE17 allows attackers to cause a denial of service (process exit) via unknown vectors that cause an array to shrink to 0 entries, which triggers an assert error.  NOTE: this issue is due to an incorrect fix for CVE-2007-6239.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1612"/>
        <description>The arrayShrink function (lib/Array.c) in Squid 2.6.STABLE17 allows attackers to cause a denial of service (process exit) via unknown vectors that cause an array to shrink to 0 entries, which triggers an assert error.  NOTE: this issue is due to an incorrect fix for CVE-2007-6239.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:59.682-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:04.113-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:47.994-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11376 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:38.730-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:37.142-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 0:2.5.STABLE3-9.3E" test_ref="oval:org.mitre.oval:tst:36413"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 0:2.5.STABLE14-1.4E.el4_6.2" test_ref="oval:org.mitre.oval:tst:36396"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="squid is earlier than 0:2.6.STABLE6-5.el5_1.3" test_ref="oval:org.mitre.oval:tst:36064"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11375" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with "setting up TSS limits," allows local users to cause a denial of service (crash) and possibly execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0812"/>
        <description>Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with "setting up TSS limits," allows local users to cause a denial of service (crash) and possibly execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:10.615-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:03.787-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:47.694-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11375 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:16.688-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:36.740-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30934"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30708"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30577"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30874"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30794"/>
          <criterion comment="kernel is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30892"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30873"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:31080"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30866"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11374" version="5" class="vulnerability">
      <metadata>
        <title>Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers to cause a denial of service (crash) via a malformed RPC Portmap packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121"/>
        <description>Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers to cause a denial of service (crash) via a malformed RPC Portmap packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:06.949-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:03.416-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:47.322-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11374 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:47.691-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:36.192-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:36051"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el4" test_ref="oval:org.mitre.oval:tst:35980"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35669"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el4" test_ref="oval:org.mitre.oval:tst:35941"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:35709"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-1.el5" test_ref="oval:org.mitre.oval:tst:36120"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35712"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-2.el5" test_ref="oval:org.mitre.oval:tst:35801"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11373" version="5" class="vulnerability">
      <metadata>
        <title>Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488"/>
        <description>Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:26.562-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:03.116-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:46.955-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11373 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:30.726-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:35.713-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31712"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31065"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31933"/>
            <criterion comment="telnet is earlier than 1:0.17-26.EL3.3" test_ref="oval:org.mitre.oval:tst:31911"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31927"/>
            <criterion comment="telnet-server is earlier than 1:0.17-26.EL3.3" test_ref="oval:org.mitre.oval:tst:31044"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-47" test_ref="oval:org.mitre.oval:tst:31772"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="telnet is earlier than 1:0.17-31.EL4.3" test_ref="oval:org.mitre.oval:tst:32031"/>
            <criterion comment="telnet-server is earlier than 1:0.17-31.EL4.3" test_ref="oval:org.mitre.oval:tst:31637"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11372" version="5" class="vulnerability">
      <metadata>
        <title>The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1169"/>
        <description>The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:16.790-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:02.601-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:46.483-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11372 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:52.141-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:35.069-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38227"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38356"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38435"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38265"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38483"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38434"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38650"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38352"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38301"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.7-3.el4" test_ref="oval:org.mitre.oval:tst:38636"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38297"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38205"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38583"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38616"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38657"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38632"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.7-3.el5" test_ref="oval:org.mitre.oval:tst:38281"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.7-3.el5" test_ref="oval:org.mitre.oval:tst:38646"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.7-3.el5" test_ref="oval:org.mitre.oval:tst:37687"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11371" version="5" class="vulnerability">
      <metadata>
        <title>Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0721"/>
        <description>Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:40.740-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:02.381-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:46.251-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11371 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:14.290-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:34.730-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kdebase is earlier than 6:3.1.3-5.4" test_ref="oval:org.mitre.oval:tst:30731"/>
          <criterion comment="kdebase-devel is earlier than 6:3.1.3-5.4" test_ref="oval:org.mitre.oval:tst:29837"/>
          <criterion comment="kdelibs is earlier than 6:3.1.3-6.6" test_ref="oval:org.mitre.oval:tst:30063"/>
          <criterion comment="kdelibs-devel is earlier than 6:3.1.3-6.6" test_ref="oval:org.mitre.oval:tst:30768"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11370" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976"/>
        <description>Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:28.082-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:02.124-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:45.946-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11370 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:19.288-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:34.343-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-13.el3.3" test_ref="oval:org.mitre.oval:tst:32203"/>
            <criterion comment="gdk-pixbuf-gnome is earlier than 1:0.22.0-13.el3.3" test_ref="oval:org.mitre.oval:tst:32393"/>
            <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-13.el3.3" test_ref="oval:org.mitre.oval:tst:32388"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gdk-pixbuf-devel is earlier than 1:0.22.0-17.el4.3" test_ref="oval:org.mitre.oval:tst:32239"/>
            <criterion comment="gdk-pixbuf is earlier than 1:0.22.0-17.el4.3" test_ref="oval:org.mitre.oval:tst:32331"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11369" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in secure locate (slocate) before 2.7 allows local users to execute arbitrary code via a long (1) -c or (2) -r command line argument.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0056"/>
        <description>Buffer overflow in secure locate (slocate) before 2.7 allows local users to execute arbitrary code via a long (1) -c or (2) -r command line argument.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:19.992-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:01.882-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:45.729-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11369 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:53.876-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:34.070-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="slocate is earlier than 0:2.7-3" test_ref="oval:org.mitre.oval:tst:30343"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11368" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1044"/>
        <description>Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:31.118-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:01.408-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:45.098-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11368 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:40.664-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:33.381-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38227"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38356"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38435"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38265"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38483"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38434"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38650"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38352"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.36.el3" test_ref="oval:org.mitre.oval:tst:38301"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.7-3.el4" test_ref="oval:org.mitre.oval:tst:38636"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38297"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38205"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38583"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38616"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38657"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-40.el4" test_ref="oval:org.mitre.oval:tst:38632"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.7-3.el5" test_ref="oval:org.mitre.oval:tst:38281"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.7-3.el5" test_ref="oval:org.mitre.oval:tst:38646"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.7-3.el5" test_ref="oval:org.mitre.oval:tst:37687"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11365" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075"/>
        <description>Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:07.451-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:09:00.096-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:43.799-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11365 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:27.620-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:32.294-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39378"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39359"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39036"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39270"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39397"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39118"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:38444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39284"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:38466"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.45.el3" test_ref="oval:org.mitre.oval:tst:39389"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.5-1.el4_8" test_ref="oval:org.mitre.oval:tst:39088"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39081"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.5-1.el4_8" test_ref="oval:org.mitre.oval:tst:39351"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:38976"/>
            <criterion comment="firefox is earlier than 0:3.0.14-1.el4" test_ref="oval:org.mitre.oval:tst:39195"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39181"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39364"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-48.el4_8" test_ref="oval:org.mitre.oval:tst:39293"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39208"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39001"/>
            <criterion comment="nspr is earlier than 0:4.7.5-1.el5_4" test_ref="oval:org.mitre.oval:tst:39223"/>
            <criterion comment="firefox is earlier than 0:3.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39097"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.5-1.el5_4" test_ref="oval:org.mitre.oval:tst:39150"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.14-1.el5_4" test_ref="oval:org.mitre.oval:tst:39206"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11361" version="5" class="vulnerability">
      <metadata>
        <title>Untrusted search path vulnerability in a certain Red Hat build script for OpenOffice.org (OOo) 1.1.x on Red Hat Enterprise Linux (RHEL) 3 and 4 allows local users to gain privileges via a malicious library in the current working directory, related to incorrect quoting of the ORIGIN symbol for use in the RPATH library path.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2366"/>
        <description>Untrusted search path vulnerability in a certain Red Hat build script for OpenOffice.org (OOo) 1.1.x on Red Hat Enterprise Linux (RHEL) 3 and 4 allows local users to gain privileges via a malicious library in the current working directory, related to incorrect quoting of the ORIGIN symbol for use in the RPATH library path.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:11.050-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:59.583-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:43.241-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11361 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:34.436-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:31.500-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-42.2.0.EL3" test_ref="oval:org.mitre.oval:tst:37041"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-42.2.0.EL3" test_ref="oval:org.mitre.oval:tst:37101"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-42.2.0.EL3" test_ref="oval:org.mitre.oval:tst:37231"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.5-10.6.0.5.EL4" test_ref="oval:org.mitre.oval:tst:37258"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.5-10.6.0.5.EL4" test_ref="oval:org.mitre.oval:tst:37327"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.5-10.6.0.5.EL4" test_ref="oval:org.mitre.oval:tst:36748"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.5-10.6.0.5.EL4" test_ref="oval:org.mitre.oval:tst:37002"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11360" version="5" class="vulnerability">
      <metadata>
        <title>The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local users to overwrite files via a symlink attack on temporary files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0977"/>
        <description>The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local users to overwrite files via a symlink attack on temporary files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:09.788-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:59.268-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:42.879-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11360 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:05.647-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:30.900-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="rh-postgresql-devel is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:30824"/>
          <criterion comment="rh-postgresql-server is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:30911"/>
          <criterion comment="rh-postgresql-python is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:30996"/>
          <criterion comment="rh-postgresql-libs is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:31081"/>
          <criterion comment="rh-postgresql-docs is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:30917"/>
          <criterion comment="rh-postgresql-test is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:30961"/>
          <criterion comment="rh-postgresql-pl is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:30966"/>
          <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:30232"/>
          <criterion comment="rh-postgresql is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:31030"/>
          <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:30959"/>
          <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.8-2" test_ref="oval:org.mitre.oval:tst:30916"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11356" version="5" class="vulnerability">
      <metadata>
        <title>The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016"/>
        <description>The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:05.842-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:58.300-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:41.883-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11356 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:48.383-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:29.630-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-17.el4" test_ref="oval:org.mitre.oval:tst:37872"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.18-1.el5" test_ref="oval:org.mitre.oval:tst:38015"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11355" version="5" class="vulnerability">
      <metadata>
        <title>The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403"/>
        <description>The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:55.581-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:57.967-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:41.575-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11355 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:52.245-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:29.186-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.9-1.3E.10" test_ref="oval:org.mitre.oval:tst:32912"/>
            <criterion comment="samba-swat is earlier than 0:3.0.9-1.3E.10" test_ref="oval:org.mitre.oval:tst:32281"/>
            <criterion comment="samba-client is earlier than 0:3.0.9-1.3E.10" test_ref="oval:org.mitre.oval:tst:32746"/>
            <criterion comment="samba is earlier than 0:3.0.9-1.3E.10" test_ref="oval:org.mitre.oval:tst:32584"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.10-1.4E.6.2" test_ref="oval:org.mitre.oval:tst:32794"/>
            <criterion comment="samba-swat is earlier than 0:3.0.10-1.4E.6.2" test_ref="oval:org.mitre.oval:tst:32921"/>
            <criterion comment="samba-client is earlier than 0:3.0.10-1.4E.6.2" test_ref="oval:org.mitre.oval:tst:32338"/>
            <criterion comment="samba is earlier than 0:3.0.10-1.4E.6.2" test_ref="oval:org.mitre.oval:tst:32826"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11354" version="5" class="vulnerability">
      <metadata>
        <title>The "%xx" URL decoding function in Squid 2.5STABLE4 and earlier allows remote attackers to bypass url_regex ACLs via a URL with a NULL ("%00") characterm, which causes Squid to use only a portion of the requested URL when comparing it against the access control lists.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0189"/>
        <description>The "%xx" URL decoding function in Squid 2.5STABLE4 and earlier allows remote attackers to bypass url_regex ACLs via a URL with a NULL ("%00") characterm, which causes Squid to use only a portion of the requested URL when comparing it against the access control lists.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:38.887-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:57.785-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:41.376-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11354 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:31.531-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:28.835-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="squid is earlier than 7:2.5.STABLE3-5.3E" test_ref="oval:org.mitre.oval:tst:30351"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11351" version="5" class="vulnerability">
      <metadata>
        <title>Wireshark 1.0.4 and earlier allows remote attackers to cause a denial of service via a long SMTP request, which triggers an infinite loop.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5285"/>
        <description>Wireshark 1.0.4 and earlier allows remote attackers to cause a denial of service via a long SMTP request, which triggers an infinite loop.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:07.927-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:57.210-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:40.704-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11351 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:53.098-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:27.560-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38023"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38321"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38000"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38041"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38236"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38085"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11350" version="5" class="vulnerability">
      <metadata>
        <title>Multiple off-by-one errors in Wireshark (aka Ethereal) 0.9.7 to 0.99.0 have unknown impact and remote attack vectors via the (1) NCP NMAS and (2) NDPS dissectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630"/>
        <description>Multiple off-by-one errors in Wireshark (aka Ethereal) 0.9.7 to 0.99.0 have unknown impact and remote attack vectors via the (1) NCP NMAS and (2) NDPS dissectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:49.270-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:56.891-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:40.438-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11350 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:46.500-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:27.174-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32882"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32738"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32917"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32447"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11348" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unknown "other problems" in the KINK dissector in Ethereal before 0.10.11 have unknown impact and attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1458"/>
        <description>Multiple unknown "other problems" in the KINK dissector in Ethereal before 0.10.11 have unknown impact and attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:41.442-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:56.416-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:39.898-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11348 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:27.735-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:26.385-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11347" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746"/>
        <description>Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:36.638-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:56.200-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:39.664-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11347 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:22.767-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:26.007-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gnupg is earlier than 0:1.2.1-17" test_ref="oval:org.mitre.oval:tst:32266"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gnupg is earlier than 0:1.2.6-6" test_ref="oval:org.mitre.oval:tst:32119"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11346" version="5" class="vulnerability">
      <metadata>
        <title>Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3848"/>
        <description>Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:56.225-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:55.770-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:39.263-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11346 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:34.944-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:25.493-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32525"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32366"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32381"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32215"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32464"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32288"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:31978"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32438"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32070"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32415"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32137"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32528"/>
            <criterion comment="kernel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:31866"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32446"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-22.0.2.EL" test_ref="oval:org.mitre.oval:tst:32450"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11342" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the LLT dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0456"/>
        <description>Unspecified vulnerability in the LLT dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:35.603-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:53.619-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:37.142-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11342 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:33.719-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:22.906-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.5-EL3.1" test_ref="oval:org.mitre.oval:tst:33506"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.5-EL3.1" test_ref="oval:org.mitre.oval:tst:33535"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.5-EL4.1" test_ref="oval:org.mitre.oval:tst:33380"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.5-EL4.1" test_ref="oval:org.mitre.oval:tst:33530"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.5-1.el5" test_ref="oval:org.mitre.oval:tst:33509"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.5-1.el5" test_ref="oval:org.mitre.oval:tst:33591"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11341" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1993"/>
        <description>Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:51.982-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:53.401-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:36.873-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11341 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:03.606-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:22.554-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="sudo is earlier than 0:1.6.7p5-1.1" test_ref="oval:org.mitre.oval:tst:31628"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="sudo is earlier than 0:1.6.7p5-30.1.1" test_ref="oval:org.mitre.oval:tst:31653"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11338" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in Java Applets in OpenOffice.org 1.1.x (aka StarOffice) up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to escape the Java sandbox and conduct unauthorized activities via certain applets in OpenOffice documents.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2199"/>
        <description>Unspecified vulnerability in Java Applets in OpenOffice.org 1.1.x (aka StarOffice) up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to escape the Java sandbox and conduct unauthorized activities via certain applets in OpenOffice documents.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:57.430-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:52.600-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:36.123-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11338 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:30.895-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:21.438-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-34.2.0.EL3" test_ref="oval:org.mitre.oval:tst:32211"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-34.2.0.EL3" test_ref="oval:org.mitre.oval:tst:32773"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-34.2.0.EL3" test_ref="oval:org.mitre.oval:tst:31834"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32763"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32657"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32835"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32791"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11337" version="5" class="vulnerability">
      <metadata>
        <title>The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0859"/>
        <description>The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:34.072-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:52.329-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:35.787-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11337 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:51.429-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:21.088-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="glibc is earlier than 0:2.3.2-95.6" test_ref="oval:org.mitre.oval:tst:30414"/>
          <criterion comment="glibc-utils is earlier than 0:2.3.2-95.6" test_ref="oval:org.mitre.oval:tst:30269"/>
          <criterion comment="glibc-devel is earlier than 0:2.3.2-95.6" test_ref="oval:org.mitre.oval:tst:29718"/>
          <criterion comment="nptl-devel is earlier than 0:2.3.2-95.6" test_ref="oval:org.mitre.oval:tst:30380"/>
          <criterion comment="nscd is earlier than 0:2.3.2-95.6" test_ref="oval:org.mitre.oval:tst:30097"/>
          <criterion comment="glibc-profile is earlier than 0:2.3.2-95.6" test_ref="oval:org.mitre.oval:tst:30446"/>
          <criterion comment="glibc-common is earlier than 0:2.3.2-95.6" test_ref="oval:org.mitre.oval:tst:30585"/>
          <criterion comment="glibc-headers is earlier than 0:2.3.2-95.6" test_ref="oval:org.mitre.oval:tst:30030"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11334" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.5 allows remote attackers to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL, which is run in the context of the previous page, and may lead to code execution if the standalone application loads a privileged chrome: URL.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2267"/>
        <description>Firefox before 1.0.5 allows remote attackers to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL, which is run in the context of the previous page, and may lead to code execution if the standalone application loads a privileged chrome: URL.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:32.128-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:51.280-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:34.580-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11334 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:30.496-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:19.491-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32142"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32131"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32154"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32001"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32171"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32162"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31782"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32041"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32004"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31353"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32120"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31633"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31837"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32100"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31821"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31904"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31814"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31951"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31554"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32149"/>
            <criterion comment="firefox is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32167"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31998"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32061"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11332" version="5" class="vulnerability">
      <metadata>
        <title>The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180"/>
        <description>The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:39.512-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:50.590-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:34.178-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11332 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:27.983-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:18.927-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32525"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32366"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32381"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32215"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32464"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32288"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:31978"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32438"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.0.1.EL" test_ref="oval:org.mitre.oval:tst:32070"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-22.0.1.EL" test_ref="oval:org.mitre.oval:tst:32382"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-22.0.1.EL" test_ref="oval:org.mitre.oval:tst:32096"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-22.0.1.EL" test_ref="oval:org.mitre.oval:tst:32404"/>
            <criterion comment="kernel is earlier than 0:2.6.9-22.0.1.EL" test_ref="oval:org.mitre.oval:tst:32387"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-22.0.1.EL" test_ref="oval:org.mitre.oval:tst:32210"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-22.0.1.EL" test_ref="oval:org.mitre.oval:tst:32355"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-22.0.1.EL" test_ref="oval:org.mitre.oval:tst:32373"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11331" version="5" class="vulnerability">
      <metadata>
        <title>The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777"/>
        <description>The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:45.140-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:49.931-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:33.491-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11331 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:10.778-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:18.096-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33391"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33688"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33675"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33724"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33510"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33409"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33467"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33658"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33649"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33381"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:32760"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33554"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33648"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:32765"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33712"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33705"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33379"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:33400"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:33759"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33678"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33695"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33697"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33244"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33645"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33461"/>
            <criterion comment="yelp is earlier than 0:2.16.0-14.0.1.el5" test_ref="oval:org.mitre.oval:tst:33761"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33744"/>
            <criterion comment="devhelp is earlier than 0:0.12-10.0.1.el5" test_ref="oval:org.mitre.oval:tst:33415"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-2.el5" test_ref="oval:org.mitre.oval:tst:33616"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-1.el5" test_ref="oval:org.mitre.oval:tst:33493"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11329" version="5" class="vulnerability">
      <metadata>
        <title>Linux kernel before 2.4.21 allows local users to cause a denial of service (kernel panic) via asynchronous input or output on a FIFO special file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5001"/>
        <description>Linux kernel before 2.4.21 allows local users to cause a denial of service (kernel panic) via asynchronous input or output on a FIFO special file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:22.891-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:49.627-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:33.199-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11329 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:50.422-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:17.687-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35915"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35794"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36513"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36264"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36161"/>
          <criterion comment="kernel is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36518"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36597"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36612"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36171"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11327" version="5" class="vulnerability">
      <metadata>
        <title>Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864"/>
        <description>Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:28.349-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:48.942-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:32.487-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11327 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:21.152-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:16.674-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33074"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32633"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33103"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33001"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32937"/>
            <criterion comment="kernel is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32280"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33127"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32855"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33021"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32235"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32371"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32703"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32314"/>
            <criterion comment="kernel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32614"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32295"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32310"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32611"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-34.0.1.EL" test_ref="oval:org.mitre.oval:tst:32305"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11325" version="5" class="vulnerability">
      <metadata>
        <title>Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754"/>
        <description>Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:38.831-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:48.365-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:31.752-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11325 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:14.862-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:15.770-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:37450"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:38245"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:38284"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:38008"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38414"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38395"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38442"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38234"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.2.1-19.el5" test_ref="oval:org.mitre.oval:tst:33863"/>
            <criterion comment="freetype-demos is earlier than 0:2.2.1-19.el5" test_ref="oval:org.mitre.oval:tst:34305"/>
            <criterion comment="freetype-devel is earlier than 0:2.2.1-19.el5" test_ref="oval:org.mitre.oval:tst:33877"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11324" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the RMI dissector in Wireshark (formerly Ethereal) 0.9.5 through 1.0.0 allows remote attackers to read system memory via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141"/>
        <description>Unspecified vulnerability in the RMI dissector in Wireshark (formerly Ethereal) 0.9.5 through 1.0.0 allows remote attackers to read system memory via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:08.873-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:48.077-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:31.446-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11324 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:19.559-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:15.294-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37624"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37249"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37725"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37542"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37460"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11323" version="5" class="vulnerability">
      <metadata>
        <title>Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800"/>
        <description>Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:55.795-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:47.430-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:30.788-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11323 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:49.330-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:14.435-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 1:2.02-14.el3" test_ref="oval:org.mitre.oval:tst:38322"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38126"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-13.el4" test_ref="oval:org.mitre.oval:tst:38230"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38481"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_7.4" test_ref="oval:org.mitre.oval:tst:38436"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38145"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="xpdf is earlier than 1:3.00-20.el4" test_ref="oval:org.mitre.oval:tst:38649"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.27.el4_7.5" test_ref="oval:org.mitre.oval:tst:38607"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38618"/>
            <criterion comment="cups-lpd is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38471"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40312"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-12.el5_3" test_ref="oval:org.mitre.oval:tst:38271"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38760"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40122"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38541"/>
            <criterion comment="tetex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40413"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40398"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38500"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40444"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38512"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:37935"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40008"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:39920"/>
            <criterion comment="cups is earlier than 1:1.3.7-8.el5_3.4" test_ref="oval:org.mitre.oval:tst:38334"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11321" version="5" class="vulnerability">
      <metadata>
        <title>Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907"/>
        <description>Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:28.725-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:46.434-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:29.751-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11321 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:55.255-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:13.129-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33459"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33371"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33748"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33090"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33419"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33665"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33475"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33282"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33636"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33548"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33156"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33407"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33562"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33500"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33725"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33105"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33501"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33691"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33662"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33087"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33640"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:32784"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33240"/>
            <criterion comment="php-common is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33527"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33617"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33561"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33385"/>
            <criterion comment="php is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33615"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33526"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33747"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33735"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33403"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33686"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33502"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33666"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33508"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33652"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33676"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33784"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33706"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11319" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1139"/>
        <description>Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:35.776-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:46.190-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:29.492-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11319 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:20.923-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:12.680-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31265"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31218"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31097"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31103"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11318" version="5" class="vulnerability">
      <metadata>
        <title>The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444"/>
        <description>The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:25.828-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:45.726-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:29.055-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11318 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:46.131-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:12.126-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32158"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32589"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32704"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32562"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32078"/>
            <criterion comment="kernel is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32513"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32231"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32097"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-47.EL" test_ref="oval:org.mitre.oval:tst:32708"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32576"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32814"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32958"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32801"/>
            <criterion comment="kernel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32865"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32880"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32747"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32200"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32838"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11317" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.7 and Mozilla before Suite 1.7.12 allows remote attackers to execute Javascript with chrome privileges via an about: page such as about:mozilla.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2706"/>
        <description>Firefox before 1.0.7 and Mozilla before Suite 1.7.12 allows remote attackers to execute Javascript with chrome privileges via an about: page such as about:mozilla.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:44.795-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:45.241-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:28.510-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11317 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:53.822-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:11.438-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32169"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:31729"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32242"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32151"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32014"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32144"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32068"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32248"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32293"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32244"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32012"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:31897"/>
            <criterion comment="thunderbird is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:31477"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32300"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32226"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32289"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32170"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32150"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32302"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32090"/>
            <criterion comment="firefox is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:32147"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32209"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32088"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11316" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939"/>
        <description>Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:06.880-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:44.807-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:28.125-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11316 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:52.378-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:10.856-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-71.ent" test_ref="oval:org.mitre.oval:tst:37941"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-71.ent" test_ref="oval:org.mitre.oval:tst:37561"/>
            <criterion comment="httpd is earlier than 0:2.0.46-71.ent" test_ref="oval:org.mitre.oval:tst:37595"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37897"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37670"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37862"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37679"/>
            <criterion comment="httpd is earlier than 0:2.0.52-41.ent.2" test_ref="oval:org.mitre.oval:tst:37575"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-manual is earlier than 0:2.2.3-11.el5_2.4" test_ref="oval:org.mitre.oval:tst:37895"/>
            <criterion comment="httpd-devel is earlier than 0:2.2.3-11.el5_2.4" test_ref="oval:org.mitre.oval:tst:37730"/>
            <criterion comment="mod_ssl is earlier than 0:2.2.3-11.el5_2.4" test_ref="oval:org.mitre.oval:tst:36990"/>
            <criterion comment="httpd is earlier than 0:2.2.3-11.el5_2.4" test_ref="oval:org.mitre.oval:tst:37803"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11313" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1282"/>
        <description>Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:25.307-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:43.771-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:26.954-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11313 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:19.242-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:09.201-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33391"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33688"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33675"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33724"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33510"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33409"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33467"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33658"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33649"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33381"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:32760"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33554"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33648"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:32765"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33712"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33705"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33379"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:33400"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33678"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33695"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33697"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33244"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33645"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="thunderbird is earlier than 0:1.5.0.10-1.el5" test_ref="oval:org.mitre.oval:tst:33493"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11312" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0409"/>
        <description>Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:40.612-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:43.591-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:26.752-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11312 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:51.591-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:08.861-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="xchat is earlier than 1:2.0.4-4.EL" test_ref="oval:org.mitre.oval:tst:30897"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11311" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in hpc.c in dvips in teTeX and TeXlive 2007 and earlier allows user-assisted attackers to execute arbitrary code via a DVI file with a long href tag.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935"/>
        <description>Stack-based buffer overflow in hpc.c in dvips in teTeX and TeXlive 2007 and earlier allows user-assisted attackers to execute arbitrary code via a DVI file with a long href tag.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:59.422-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:43.232-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:26.375-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11311 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:49.957-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:08.362-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:39543"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40329"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40000"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40032"/>
            <criterion comment="tetex-doc is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40150"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40389"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40303"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11307" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the GSM BSSMAP dissector in Wireshark (aka Ethereal) 0.10.11 to 0.99.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627"/>
        <description>Unspecified vulnerability in the GSM BSSMAP dissector in Wireshark (aka Ethereal) 0.10.11 to 0.99.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:01.925-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:42.702-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:25.858-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11307 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:22.885-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:07.614-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32882"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL3.1" test_ref="oval:org.mitre.oval:tst:32738"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32917"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.2-EL4.1" test_ref="oval:org.mitre.oval:tst:32447"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11306" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in enscript before 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0198"/>
        <description>A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:59.077-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:42.490-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:25.642-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11306 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:31:40.846-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:07.330-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="imap-utils is earlier than 1:2002d-11" test_ref="oval:org.mitre.oval:tst:30984"/>
          <criterion comment="imap is earlier than 1:2002d-11" test_ref="oval:org.mitre.oval:tst:31122"/>
          <criterion comment="imap-devel is earlier than 1:2002d-11" test_ref="oval:org.mitre.oval:tst:31094"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11305" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780"/>
        <description>Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:58.684-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:41.960-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:24.688-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11305 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:24:00.823-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:30:05.395-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:06.692-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32575"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32674"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32919"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32864"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32659"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32859"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32902"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32837"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11303" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455"/>
        <description>Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:42.200-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:41.181-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:23.842-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11303 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:13.355-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:05.695-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33776"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33817"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33769"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33528"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33915"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33822"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33351"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33405"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33642"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33024"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33995"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33690"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33892"/>
            <criterion comment="gd-progs is earlier than 0:2.0.28-5.4E.el4_6.1" test_ref="oval:org.mitre.oval:tst:35731"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33711"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33857"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33644"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33920"/>
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:34016"/>
            <criterion comment="gd-devel is earlier than 0:2.0.28-5.4E.el4_6.1" test_ref="oval:org.mitre.oval:tst:36408"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33957"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33395"/>
            <criterion comment="gd is earlier than 0:2.0.28-5.4E.el4_6.1" test_ref="oval:org.mitre.oval:tst:36386"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33945"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33809"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33997"/>
            <criterion comment="php-common is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33290"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33828"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33441"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:34008"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33560"/>
            <criterion comment="php is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33959"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33722"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33941"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33880"/>
            <criterion comment="gd-progs is earlier than 0:2.0.33-9.4.el5_1.1" test_ref="oval:org.mitre.oval:tst:35759"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33878"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33960"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33923"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33551"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33939"/>
            <criterion comment="gd-devel is earlier than 0:2.0.33-9.4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36448"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33626"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33770"/>
            <criterion comment="gd is earlier than 0:2.0.33-9.4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36297"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:34005"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11302" version="5" class="vulnerability">
      <metadata>
        <title>vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2368"/>
        <description>vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:03.905-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:40.830-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:23.515-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11302 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:01.468-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:05.232-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.30E.4" test_ref="oval:org.mitre.oval:tst:31943"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.30E.4" test_ref="oval:org.mitre.oval:tst:31844"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.30E.4" test_ref="oval:org.mitre.oval:tst:32110"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.30E.4" test_ref="oval:org.mitre.oval:tst:31611"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.30E.4" test_ref="oval:org.mitre.oval:tst:31602"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.40E.7" test_ref="oval:org.mitre.oval:tst:32111"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.40E.7" test_ref="oval:org.mitre.oval:tst:32128"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.40E.7" test_ref="oval:org.mitre.oval:tst:31668"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.40E.7" test_ref="oval:org.mitre.oval:tst:32143"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.40E.7" test_ref="oval:org.mitre.oval:tst:31994"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11301" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the NeXT RLE decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors involving decoding large RLE images.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462"/>
        <description>Heap-based buffer overflow in the NeXT RLE decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors involving decoding large RLE images.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:05.478-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:40.370-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:23.239-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11301 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:59.834-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:04.456-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:32819"/>
            <criterion comment="libtiff is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32069"/>
            <criterion comment="kdegraphics is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:33012"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32843"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32922"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32413"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11299" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the error function in preproc.c for NASM 0.98.38 1.2 allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2005-1194.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1287"/>
        <description>Buffer overflow in the error function in preproc.c for NASM 0.98.38 1.2 allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2005-1194.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:23.638-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:38.906-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:21.743-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11299 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:47.531-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:13:02.763-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="nasm is earlier than 0:0.98.35-3.EL3" test_ref="oval:org.mitre.oval:tst:31348"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nasm-doc is earlier than 0:0.98.38-3.EL4" test_ref="oval:org.mitre.oval:tst:31776"/>
            <criterion comment="nasm is earlier than 0:0.98.38-3.EL4" test_ref="oval:org.mitre.oval:tst:31746"/>
            <criterion comment="nasm-rdoff is earlier than 0:0.98.38-3.EL4" test_ref="oval:org.mitre.oval:tst:31654"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11297" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0 and Mozilla before 1.7.5 display the SSL lock icon when an insecure page loads a binary file from a trusted site, which could facilitate phishing attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0143"/>
        <description>Firefox before 1.0 and Mozilla before 1.7.5 display the SSL lock icon when an insecure page loads a binary file from a trusted site, which could facilitate phishing attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:32.846-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:36.120-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:19.192-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11297 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:21.289-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:59.826-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30665"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31499"/>
            <criterion comment="mozilla is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31604"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31381"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31622"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30651"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31560"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31110"/>
            <criterion comment="evolution is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31003"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31404"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31375"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31106"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31418"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31558"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11294" version="5" class="vulnerability">
      <metadata>
        <title>Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1921"/>
        <description>Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:22.739-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:35.330-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:18.407-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11294 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:43.539-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:58.707-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:31903"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:31997"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:32058"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:32011"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:31769"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:31610"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-24.ent" test_ref="oval:org.mitre.oval:tst:32022"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31993"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31996"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:32047"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31303"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31718"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31829"/>
            <criterion comment="php is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31181"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:32064"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31623"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31882"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31988"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:32010"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31662"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.7" test_ref="oval:org.mitre.oval:tst:31873"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11292" version="5" class="vulnerability">
      <metadata>
        <title>The gaim_markup_strip_html function in Gaim 1.2.0, and possibly earlier versions, allows remote attackers to cause a denial of service (application crash) via a string that contains malformed HTML, which causes an out-of-bounds read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0965"/>
        <description>The gaim_markup_strip_html function in Gaim 1.2.0, and possibly earlier versions, allows remote attackers to cause a denial of service (application crash) via a string that contains malformed HTML, which causes an out-of-bounds read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:39.121-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:34.845-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:17.899-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11292 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:32.075-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:57.969-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.2.1-4.el3" test_ref="oval:org.mitre.oval:tst:31686"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gaim is earlier than 1:1.2.1-4.el4" test_ref="oval:org.mitre.oval:tst:31403"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11291" version="5" class="vulnerability">
      <metadata>
        <title>The privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval function or the Script object.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1160"/>
        <description>The privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval function or the Script object.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:29.286-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:34.365-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:17.397-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11291 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:57.923-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:57.359-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31478"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31488"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31751"/>
            <criterion comment="thunderbird is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32113"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31647"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30850"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31749"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31658"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31636"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31780"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30828"/>
            <criterion comment="firefox is earlier than 0:1.0.3-1.4.1" test_ref="oval:org.mitre.oval:tst:31646"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31716"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31758"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11290" version="5" class="vulnerability">
      <metadata>
        <title>unlzh.c in the LHZ component in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted GZIP archive.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338"/>
        <description>unlzh.c in the LHZ component in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted GZIP archive.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:27.350-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:34.149-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:17.167-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11290 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:49.346-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:56.972-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gzip is earlier than 0:1.3.3-13.rhel3" test_ref="oval:org.mitre.oval:tst:32961"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gzip is earlier than 0:1.3.3-16.rhel4" test_ref="oval:org.mitre.oval:tst:32979"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11289" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606"/>
        <description>Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:32.592-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:33.788-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:16.806-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11289 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:11.439-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:56.458-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 1:2.02-17.el3" test_ref="oval:org.mitre.oval:tst:39361"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_7.4" test_ref="oval:org.mitre.oval:tst:38436"/>
            <criterion comment="xpdf is earlier than 1:3.00-22.el4_8.1" test_ref="oval:org.mitre.oval:tst:38963"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-15.el5_4.2" test_ref="oval:org.mitre.oval:tst:39062"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38512"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38500"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-15.el5_4.2" test_ref="oval:org.mitre.oval:tst:39529"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38760"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11286" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3651"/>
        <description>Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:29.222-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:32.888-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:15.833-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11286 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:20.383-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:55.230-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.14-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32303"/>
            <criterion comment="ethereal is earlier than 0:0.10.14-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32466"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.14-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32538"/>
            <criterion comment="ethereal is earlier than 0:0.10.14-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32039"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11284" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0597"/>
        <description>Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:07.272-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:32.550-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:15.449-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11284 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:19.632-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:54.766-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="libpng10-devel is earlier than 0:1.0.13-15" test_ref="oval:org.mitre.oval:tst:29821"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="libpng-devel is earlier than 2:1.2.2-25" test_ref="oval:org.mitre.oval:tst:30405"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="libpng10 is earlier than 0:1.0.13-15" test_ref="oval:org.mitre.oval:tst:30512"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
          <criterion comment="libpng is earlier than 2:1.2.2-25" test_ref="oval:org.mitre.oval:tst:30788"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11282" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1237"/>
        <description>Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:36.998-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:31.979-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:14.782-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11282 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:56.985-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:54.007-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31090"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31317"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31165"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31297"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31259"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:30906"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31029"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:31014"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.2.EL" test_ref="oval:org.mitre.oval:tst:30920"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11281" version="5" class="vulnerability">
      <metadata>
        <title>Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk and .firm.in, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0746"/>
        <description>Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk and .firm.in, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:06.311-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:31.766-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:14.433-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11281 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:51.567-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:53.708-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kdebase is earlier than 6:3.1.3-5.4" test_ref="oval:org.mitre.oval:tst:30731"/>
          <criterion comment="kdebase-devel is earlier than 6:3.1.3-5.4" test_ref="oval:org.mitre.oval:tst:29837"/>
          <criterion comment="kdelibs is earlier than 6:3.1.3-6.6" test_ref="oval:org.mitre.oval:tst:30063"/>
          <criterion comment="kdelibs-devel is earlier than 6:3.1.3-6.6" test_ref="oval:org.mitre.oval:tst:30768"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11280" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c.  NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031"/>
        <description>Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c.  NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:44.735-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:31.367-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:13.966-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11280 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:33.759-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:53.143-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38704"/>
            <criterion comment="tkinter is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38695"/>
            <criterion comment="python-tools is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38872"/>
            <criterion comment="python is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:38617"/>
            <criterion comment="python-docs is earlier than 0:2.2.3-6.11" test_ref="oval:org.mitre.oval:tst:37965"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38916"/>
            <criterion comment="tkinter is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38703"/>
            <criterion comment="python-tools is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38787"/>
            <criterion comment="python is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38939"/>
            <criterion comment="python-docs is earlier than 0:2.3.4-14.7.el4_8.2" test_ref="oval:org.mitre.oval:tst:38081"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="python-devel is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38889"/>
            <criterion comment="tkinter is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38958"/>
            <criterion comment="python-tools is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38827"/>
            <criterion comment="python is earlier than 0:2.4.3-24.el5_3.6" test_ref="oval:org.mitre.oval:tst:38282"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11278" version="5" class="vulnerability">
      <metadata>
        <title>Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1142"/>
        <description>Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:00.669-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:30.862-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:13.478-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11278 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:45.498-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:52.347-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31265"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31218"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31097"/>
            <criterion comment="ethereal is earlier than 0:0.10.9-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31103"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11277" version="5" class="vulnerability">
      <metadata>
        <title>Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443"/>
        <description>Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:44.451-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:30.468-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:12.987-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11277 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:08.120-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:51.725-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:33627"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:34238"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:34171"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:33767"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-66" test_ref="oval:org.mitre.oval:tst:34147"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34640"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34202"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34749"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34767"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-49" test_ref="oval:org.mitre.oval:tst:34660"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34728"/>
            <criterion comment="krb5 is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34350"/>
            <criterion comment="krb5-libs is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34575"/>
            <criterion comment="krb5-server is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34729"/>
            <criterion comment="krb5-devel is earlier than 0:1.5-26" test_ref="oval:org.mitre.oval:tst:34195"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11276" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949"/>
        <description>Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:10.364-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:29.991-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:12.629-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11276 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:37.652-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:51.227-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gimp-devel is earlier than 0:1.2.3-20.9.el3" test_ref="oval:org.mitre.oval:tst:34383"/>
            <criterion comment="gimp-perl is earlier than 0:1.2.3-20.9.el3" test_ref="oval:org.mitre.oval:tst:34552"/>
            <criterion comment="gimp is earlier than 0:1.2.3-20.9.el3" test_ref="oval:org.mitre.oval:tst:34504"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gimp-devel is earlier than 0:2.0.5-7.0.7.el4" test_ref="oval:org.mitre.oval:tst:34679"/>
            <criterion comment="gimp is earlier than 0:2.0.5-7.0.7.el4" test_ref="oval:org.mitre.oval:tst:34499"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gimp-libs is earlier than 0:2.2.13-2.0.7.el5" test_ref="oval:org.mitre.oval:tst:34469"/>
            <criterion comment="gimp-devel is earlier than 0:2.2.13-2.0.7.el5" test_ref="oval:org.mitre.oval:tst:34574"/>
            <criterion comment="gimp is earlier than 0:2.2.13-2.0.7.el5" test_ref="oval:org.mitre.oval:tst:34697"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11273" version="5" class="vulnerability">
      <metadata>
        <title>Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allows attackers to cause a denial of service (hang) via a crafted NCP packet that triggers an infinite loop.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3932"/>
        <description>Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allows attackers to cause a denial of service (hang) via a crafted NCP packet that triggers an infinite loop.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:10.486-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:29.463-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:12.067-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11273 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:27.330-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:50.722-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37624"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-EL3.3" test_ref="oval:org.mitre.oval:tst:37207"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37249"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-3.el4_7" test_ref="oval:org.mitre.oval:tst:37725"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37542"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.3-4.el5_2" test_ref="oval:org.mitre.oval:tst:37460"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11272" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212"/>
        <description>Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:33.098-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:29.008-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:11.614-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11272 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:54.431-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:50.141-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-71" test_ref="oval:org.mitre.oval:tst:39799"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-71" test_ref="oval:org.mitre.oval:tst:39761"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-71" test_ref="oval:org.mitre.oval:tst:39227"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-71" test_ref="oval:org.mitre.oval:tst:39626"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-71" test_ref="oval:org.mitre.oval:tst:39771"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-62.el4_8.1" test_ref="oval:org.mitre.oval:tst:39242"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-62.el4_8.1" test_ref="oval:org.mitre.oval:tst:39546"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-62.el4_8.1" test_ref="oval:org.mitre.oval:tst:39236"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-62.el4_8.1" test_ref="oval:org.mitre.oval:tst:39715"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-62.el4_8.1" test_ref="oval:org.mitre.oval:tst:39679"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.6.1-36.el5_4.1" test_ref="oval:org.mitre.oval:tst:39207"/>
            <criterion comment="krb5 is earlier than 0:1.6.1-36.el5_4.1" test_ref="oval:org.mitre.oval:tst:39532"/>
            <criterion comment="krb5-libs is earlier than 0:1.6.1-36.el5_4.1" test_ref="oval:org.mitre.oval:tst:39769"/>
            <criterion comment="krb5-server is earlier than 0:1.6.1-36.el5_4.1" test_ref="oval:org.mitre.oval:tst:39828"/>
            <criterion comment="krb5-devel is earlier than 0:1.6.1-36.el5_4.1" test_ref="oval:org.mitre.oval:tst:39572"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11271" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the (1) SMPP dissector, (2) 802.3 dissector, (3) DHCP, (4) MEGACO dissector, or (5) H1 dissector in Ethereal 0.8.15 through 0.10.11 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2363"/>
        <description>Unknown vulnerability in the (1) SMPP dissector, (2) 802.3 dissector, (3) DHCP, (4) MEGACO dissector, or (5) H1 dissector in Ethereal 0.8.15 through 0.10.11 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:31.295-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:28.760-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:11.351-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11271 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:12.192-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:49.583-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.12-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31966"/>
            <criterion comment="ethereal is earlier than 0:0.10.12-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32076"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.12-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32122"/>
            <criterion comment="ethereal is earlier than 0:0.10.12-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32035"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11266" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351"/>
        <description>Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:18.598-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:26.931-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:09.401-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11266 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:52.679-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:47.231-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33447"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33884"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33550"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33984"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33936"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33976"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33799"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33867"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.4-6.el3" test_ref="oval:org.mitre.oval:tst:33835"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33958"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33791"/>
            <criterion comment="freetype is earlier than 0:2.1.4-6.el3" test_ref="oval:org.mitre.oval:tst:33906"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33929"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33764"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33070"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33716"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33788"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33928"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33930"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33951"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33950"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33932"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33656"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33963"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33466"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33846"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33660"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33687"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33689"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33499"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33719"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-120.EL" test_ref="oval:org.mitre.oval:tst:33696"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33811"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33258"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.9-5.el4" test_ref="oval:org.mitre.oval:tst:33866"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33567"/>
            <criterion comment="freetype is earlier than 0:2.1.9-5.el4" test_ref="oval:org.mitre.oval:tst:33796"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33738"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.9-5.el4" test_ref="oval:org.mitre.oval:tst:33869"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33938"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33663"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33066"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33875"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33789"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33829"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33790"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33434"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33704"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.9-5.el4" test_ref="oval:org.mitre.oval:tst:33977"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33886"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33982"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33715"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33856"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.13.37.7" test_ref="oval:org.mitre.oval:tst:33815"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.2.1-17.el5" test_ref="oval:org.mitre.oval:tst:33677"/>
            <criterion comment="libXfont is earlier than 0:1.2.2-1.0.2.el5" test_ref="oval:org.mitre.oval:tst:33903"/>
            <criterion comment="freetype-demos is earlier than 0:2.2.1-17.el5" test_ref="oval:org.mitre.oval:tst:33827"/>
            <criterion comment="libXfont-devel is earlier than 0:1.2.2-1.0.2.el5" test_ref="oval:org.mitre.oval:tst:33674"/>
            <criterion comment="freetype-devel is earlier than 0:2.2.1-17.el5" test_ref="oval:org.mitre.oval:tst:34015"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11265" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the JPEG decoder in the TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an encoded JPEG stream that is longer than the scan line size (TiffScanLineSize).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460"/>
        <description>Heap-based buffer overflow in the JPEG decoder in the TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an encoded JPEG stream that is longer than the scan line size (TiffScanLineSize).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:50.665-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:26.647-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:09.095-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11265 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:20.422-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:46.773-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:32819"/>
            <criterion comment="libtiff is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32069"/>
            <criterion comment="kdegraphics is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:33012"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32843"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32922"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32413"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11264" version="5" class="vulnerability">
      <metadata>
        <title>Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0446"/>
        <description>Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:30.465-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:26.424-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:08.806-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11264 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:39.214-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:46.429-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.8" test_ref="oval:org.mitre.oval:tst:31374"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.5" test_ref="oval:org.mitre.oval:tst:31315"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11261" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292"/>
        <description>Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:51.710-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:25.771-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:07.755-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11261 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:53:06.750-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:45.477-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.0.9-2.30E.24" test_ref="oval:org.mitre.oval:tst:36837"/>
            <criterion comment="net-snmp is earlier than 0:5.0.9-2.30E.24" test_ref="oval:org.mitre.oval:tst:37027"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.0.9-2.30E.24" test_ref="oval:org.mitre.oval:tst:37070"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.0.9-2.30E.24" test_ref="oval:org.mitre.oval:tst:36912"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.0.9-2.30E.24" test_ref="oval:org.mitre.oval:tst:36958"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.1.2-11.el4_6.11.3" test_ref="oval:org.mitre.oval:tst:36843"/>
            <criterion comment="net-snmp is earlier than 0:5.1.2-11.el4_6.11.3" test_ref="oval:org.mitre.oval:tst:36880"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.1.2-11.el4_6.11.3" test_ref="oval:org.mitre.oval:tst:36663"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.1.2-11.el4_6.11.3" test_ref="oval:org.mitre.oval:tst:37050"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.1.2-11.el4_6.11.3" test_ref="oval:org.mitre.oval:tst:36948"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 1:5.3.1-24.el5_2.1" test_ref="oval:org.mitre.oval:tst:36969"/>
            <criterion comment="net-snmp is earlier than 1:5.3.1-24.el5_2.1" test_ref="oval:org.mitre.oval:tst:37054"/>
            <criterion comment="net-snmp-libs is earlier than 1:5.3.1-24.el5_2.1" test_ref="oval:org.mitre.oval:tst:36883"/>
            <criterion comment="net-snmp-perl is earlier than 1:5.3.1-24.el5_2.1" test_ref="oval:org.mitre.oval:tst:36847"/>
            <criterion comment="net-snmp-devel is earlier than 1:5.3.1-24.el5_2.1" test_ref="oval:org.mitre.oval:tst:36887"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11258" version="5" class="vulnerability">
      <metadata>
        <title>The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers to cause a denial of service (CPU and memory consumption) via a GETBULK request with a large max-repeaters value.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5846"/>
        <description>The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers to cause a denial of service (CPU and memory consumption) via a GETBULK request with a large max-repeaters value.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:51.133-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:24.860-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:06.805-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11258 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:43.008-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:44.214-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.0.9-2.30E.23" test_ref="oval:org.mitre.oval:tst:35500"/>
            <criterion comment="net-snmp is earlier than 0:5.0.9-2.30E.23" test_ref="oval:org.mitre.oval:tst:35214"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.0.9-2.30E.23" test_ref="oval:org.mitre.oval:tst:35679"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.0.9-2.30E.23" test_ref="oval:org.mitre.oval:tst:35260"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.0.9-2.30E.23" test_ref="oval:org.mitre.oval:tst:35401"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 0:5.1.2-11.el4_6.11.1" test_ref="oval:org.mitre.oval:tst:35099"/>
            <criterion comment="net-snmp is earlier than 0:5.1.2-11.el4_6.11.1" test_ref="oval:org.mitre.oval:tst:35223"/>
            <criterion comment="net-snmp-libs is earlier than 0:5.1.2-11.el4_6.11.1" test_ref="oval:org.mitre.oval:tst:35674"/>
            <criterion comment="net-snmp-perl is earlier than 0:5.1.2-11.el4_6.11.1" test_ref="oval:org.mitre.oval:tst:35414"/>
            <criterion comment="net-snmp-devel is earlier than 0:5.1.2-11.el4_6.11.1" test_ref="oval:org.mitre.oval:tst:35387"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="net-snmp-utils is earlier than 1:5.3.1-19.el5_1.1" test_ref="oval:org.mitre.oval:tst:35497"/>
            <criterion comment="net-snmp is earlier than 1:5.3.1-19.el5_1.1" test_ref="oval:org.mitre.oval:tst:35534"/>
            <criterion comment="net-snmp-libs is earlier than 1:5.3.1-19.el5_1.1" test_ref="oval:org.mitre.oval:tst:35376"/>
            <criterion comment="net-snmp-perl is earlier than 1:5.3.1-19.el5_1.1" test_ref="oval:org.mitre.oval:tst:35426"/>
            <criterion comment="net-snmp-devel is earlier than 1:5.3.1-19.el5_1.1" test_ref="oval:org.mitre.oval:tst:35655"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11256" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in the ieee_putascii function for nasm 0.98 and earlier allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2004-1287.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1194"/>
        <description>Stack-based buffer overflow in the ieee_putascii function for nasm 0.98 and earlier allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2004-1287.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:09.718-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:23.926-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:05.781-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11256 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:46.797-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:42.971-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="nasm is earlier than 0:0.98.35-3.EL3" test_ref="oval:org.mitre.oval:tst:31348"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nasm-doc is earlier than 0:0.98.38-3.EL4" test_ref="oval:org.mitre.oval:tst:31776"/>
            <criterion comment="nasm is earlier than 0:0.98.38-3.EL4" test_ref="oval:org.mitre.oval:tst:31746"/>
            <criterion comment="nasm-rdoff is earlier than 0:0.98.38-3.EL4" test_ref="oval:org.mitre.oval:tst:31654"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11254" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the LDAP dissector in Ethereal 0.8.5 through 0.10.11 allows remote attackers to cause a denial of service (free static memory and application crash) via unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2360"/>
        <description>Unknown vulnerability in the LDAP dissector in Ethereal 0.8.5 through 0.10.11 allows remote attackers to cause a denial of service (free static memory and application crash) via unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:01.006-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:23.361-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:05.156-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11254 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:21.958-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:41.997-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.12-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31966"/>
            <criterion comment="ethereal is earlier than 0:0.10.12-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32076"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.12-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32122"/>
            <criterion comment="ethereal is earlier than 0:0.10.12-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32035"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11253" version="5" class="vulnerability">
      <metadata>
        <title>Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173"/>
        <description>Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:25.469-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:23.053-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:04.785-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11253 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:03.000-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:41.573-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="sendmail is earlier than 0:8.12.11-4.RHEL3.6" test_ref="oval:org.mitre.oval:tst:32636"/>
            <criterion comment="sendmail-doc is earlier than 0:8.12.11-4.RHEL3.6" test_ref="oval:org.mitre.oval:tst:32247"/>
            <criterion comment="sendmail-cf is earlier than 0:8.12.11-4.RHEL3.6" test_ref="oval:org.mitre.oval:tst:32182"/>
            <criterion comment="sendmail-devel is earlier than 0:8.12.11-4.RHEL3.6" test_ref="oval:org.mitre.oval:tst:32742"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="sendmail is earlier than 0:8.13.1-3.RHEL4.5" test_ref="oval:org.mitre.oval:tst:32406"/>
            <criterion comment="sendmail-doc is earlier than 0:8.13.1-3.RHEL4.5" test_ref="oval:org.mitre.oval:tst:32603"/>
            <criterion comment="sendmail-cf is earlier than 0:8.13.1-3.RHEL4.5" test_ref="oval:org.mitre.oval:tst:32526"/>
            <criterion comment="sendmail-devel is earlier than 0:8.13.1-3.RHEL4.5" test_ref="oval:org.mitre.oval:tst:32452"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11252" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in UnZip 5.50 and earlier allows user-assisted attackers to execute arbitrary code via a long filename command line argument.  NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vulnerability, unless unzip is passed long arguments when it is invoked from other programs.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-4667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4667"/>
        <description>Buffer overflow in UnZip 5.50 and earlier allows user-assisted attackers to execute arbitrary code via a long filename command line argument.  NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vulnerability, unless unzip is passed long arguments when it is invoked from other programs.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:40.461-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:22.795-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:04.398-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11252 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:03.822-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:41.217-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="unzip is earlier than 0:5.50-35.EL3" test_ref="oval:org.mitre.oval:tst:30464"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="unzip is earlier than 0:5.51-9.EL4.5" test_ref="oval:org.mitre.oval:tst:33619"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11245" version="5" class="vulnerability">
      <metadata>
        <title>A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235"/>
        <description>A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:35.845-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:21.101-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:02.482-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11245 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:18:59.205-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:38.470-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gnupg is earlier than 0:1.2.1-19" test_ref="oval:org.mitre.oval:tst:32348"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gnupg is earlier than 0:1.2.6-8" test_ref="oval:org.mitre.oval:tst:33174"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11242" version="5" class="vulnerability">
      <metadata>
        <title>serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an "out-of-bounds" write for a single byte to execute arbitrary code or modify critical program data.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0418"/>
        <description>serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an "out-of-bounds" write for a single byte to execute arbitrary code or modify critical program data.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:27.485-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:20.610-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:01.893-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11242 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:08.557-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:37.748-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="cvs is earlier than 0:1.11.2-24" test_ref="oval:org.mitre.oval:tst:30480"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11239" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the BER dissector in Ethereal 0.10.11 allows remote attackers to cause a denial of service (abort or infinite loop) via unknown attack vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2366"/>
        <description>Unknown vulnerability in the BER dissector in Ethereal 0.10.11 allows remote attackers to cause a denial of service (abort or infinite loop) via unknown attack vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:59.230-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:19.737-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:01.115-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11239 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:11.211-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:36.692-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.12-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31966"/>
            <criterion comment="ethereal is earlier than 0:0.10.12-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32076"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.12-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32122"/>
            <criterion comment="ethereal is earlier than 0:0.10.12-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32035"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11237" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097"/>
        <description>Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:57.378-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:18.987-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:09:00.299-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11237 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:04.256-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:35.608-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36023"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36184"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36260"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36208"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-28" test_ref="oval:org.mitre.oval:tst:36056"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36311"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36459"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36349"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35927"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-17.el4_6.1" test_ref="oval:org.mitre.oval:tst:36106"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36419"/>
            <criterion comment="ImageMagick is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36360"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36388"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:35921"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.2.8.0-4.el5_1.1" test_ref="oval:org.mitre.oval:tst:36133"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11232" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806"/>
        <description>Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:06.178-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:16.791-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:58.168-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11232 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:12.223-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:33.105-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32342"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32877"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:31982"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32816"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32080"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32904"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32915"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32822"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32555"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11230" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to execute arbitrary script and code via a new search plugin using sidebar.addSearchEngine, aka "Firesearching 1."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1156"/>
        <description>Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to execute arbitrary script and code via a new search plugin using sidebar.addSearchEngine, aka "Firesearching 1."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:29.378-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:15.988-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:57.370-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11230 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:29.576-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:32.074-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31478"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31488"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31751"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31647"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30850"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31749"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.4" test_ref="oval:org.mitre.oval:tst:31658"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31636"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31780"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:30828"/>
            <criterion comment="firefox is earlier than 0:1.0.3-1.4.1" test_ref="oval:org.mitre.oval:tst:31646"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31716"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.4.2" test_ref="oval:org.mitre.oval:tst:31758"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11229" version="5" class="vulnerability">
      <metadata>
        <title>The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0233"/>
        <description>The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:18.804-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:15.650-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:56.934-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11229 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:16.126-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:31.569-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="firefox is earlier than 0:1.0.1-1.4.3" test_ref="oval:org.mitre.oval:tst:31118"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11228" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169"/>
        <description>Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:08.707-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:15.430-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:56.688-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11228 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:10.450-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:31.217-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gnupg is earlier than 0:1.2.1-19" test_ref="oval:org.mitre.oval:tst:32348"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gnupg is earlier than 0:1.2.6-8" test_ref="oval:org.mitre.oval:tst:33174"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11227" version="5" class="vulnerability">
      <metadata>
        <title>Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571"/>
        <description>Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:30.801-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:14.864-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:56.143-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11227 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:54.103-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:30.487-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39910"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40282"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40001"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40160"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39327"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39963"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39749"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40277"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:39865"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.50.el3" test_ref="oval:org.mitre.oval:tst:40145"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40087"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40185"/>
            <criterion comment="firefox is earlier than 0:3.0.18-1.el4" test_ref="oval:org.mitre.oval:tst:39897"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40258"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40130"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40147"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-52.el4_8" test_ref="oval:org.mitre.oval:tst:40264"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:39323"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:40174"/>
            <criterion comment="firefox is earlier than 0:3.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:40301"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.18-1.el5_4" test_ref="oval:org.mitre.oval:tst:39533"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11225" version="5" class="vulnerability">
      <metadata>
        <title>ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563"/>
        <description>ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:02.078-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:14.316-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:55.506-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11225 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:39.605-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:29.559-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="ntp is earlier than 0:4.1.2-6.el3" test_ref="oval:org.mitre.oval:tst:39300"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="ntp is earlier than 0:4.2.0.a.20040617-8.el4_8.1" test_ref="oval:org.mitre.oval:tst:39285"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="ntp is earlier than 0:4.2.2p1-9.el5_4.1" test_ref="oval:org.mitre.oval:tst:38798"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11220" version="5" class="vulnerability">
      <metadata>
        <title>Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0403"/>
        <description>Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:21.462-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:13.224-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:54.133-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11220 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:14.346-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:27.755-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="ipsec-tools is earlier than 0:0.2.5-0.4" test_ref="oval:org.mitre.oval:tst:30611"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1122" version="1" class="vulnerability">
      <metadata>
        <title>Linux Kernel elf_core_dump() Buffer Overflow</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Linux kernel</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1263"/>
        <description>The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-29T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-29T06:49:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criteria operator="OR" comment="kernel, kernel-smp or kernel-hugemem RPM earlier than 0:2.4.21-32.0.1.EL">
          <criterion comment="kernel RPM earlier than 0:2.4.21-32.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1148"/>
          <criterion comment="kernel-hugemem RPM earlier than 0:2.4.21-32.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1147"/>
          <criterion comment="kernel-smp RPM earlier than 0:2.4.21-32.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1146"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11218" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376"/>
        <description>Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:55.320-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:12.306-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:53.187-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11218 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:57.500-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:26.506-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39570"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39466"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39720"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39691"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39583"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39280"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39727"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39575"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.47.el3" test_ref="oval:org.mitre.oval:tst:39724"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.6-1.el4_8" test_ref="oval:org.mitre.oval:tst:39525"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39481"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.6-1.el4_8" test_ref="oval:org.mitre.oval:tst:38755"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39675"/>
            <criterion comment="firefox is earlier than 0:3.0.15-3.el4" test_ref="oval:org.mitre.oval:tst:39710"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39683"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39031"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39547"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-50.el4_8" test_ref="oval:org.mitre.oval:tst:39753"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39602"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39541"/>
            <criterion comment="nspr is earlier than 0:4.7.6-1.el5_4" test_ref="oval:org.mitre.oval:tst:39168"/>
            <criterion comment="firefox is earlier than 0:3.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39294"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.6-1.el5_4" test_ref="oval:org.mitre.oval:tst:39579"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.15-3.el5_4" test_ref="oval:org.mitre.oval:tst:39636"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11217" version="5" class="vulnerability">
      <metadata>
        <title>The directory-services functionality in the scheduler in CUPS 1.1.17 and 1.1.22 allows remote attackers to cause a denial of service (cupsd daemon outage or crash) via manipulations of the timing of CUPS browse packets, related to a "pointer use-after-delete flaw."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1196"/>
        <description>The directory-services functionality in the scheduler in CUPS 1.1.17 and 1.1.22 allows remote attackers to cause a denial of service (cupsd daemon outage or crash) via manipulations of the timing of CUPS browse packets, related to a "pointer use-after-delete flaw."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:57.218-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:11.979-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:52.818-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11217 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:02.965-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:26.079-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.62" test_ref="oval:org.mitre.oval:tst:38765"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.62" test_ref="oval:org.mitre.oval:tst:37797"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.62" test_ref="oval:org.mitre.oval:tst:38735"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.32.el4_8.3" test_ref="oval:org.mitre.oval:tst:38351"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.32.el4_8.3" test_ref="oval:org.mitre.oval:tst:38503"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.32.el4_8.3" test_ref="oval:org.mitre.oval:tst:38748"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11214" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0424"/>
        <description>Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:24.625-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:10.952-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:51.670-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11214 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:53.053-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:24.661-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-9.0.3.EL" test_ref="oval:org.mitre.oval:tst:30491"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-9.0.3.EL" test_ref="oval:org.mitre.oval:tst:30516"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-9.0.3.EL" test_ref="oval:org.mitre.oval:tst:30538"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-9.0.3.EL" test_ref="oval:org.mitre.oval:tst:30296"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-9.0.3.EL" test_ref="oval:org.mitre.oval:tst:30632"/>
          <criterion comment="kernel is earlier than 0:2.4.21-9.0.3.EL" test_ref="oval:org.mitre.oval:tst:30666"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-9.0.3.EL" test_ref="oval:org.mitre.oval:tst:30053"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-9.0.3.EL" test_ref="oval:org.mitre.oval:tst:30608"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-9.0.3.EL" test_ref="oval:org.mitre.oval:tst:30645"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11212" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the make_table function in the LHZ component in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted decoding table in a GZIP archive.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337"/>
        <description>Buffer overflow in the make_table function in the LHZ component in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted decoding table in a GZIP archive.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:09.238-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:10.556-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:51.232-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11212 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:35.753-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:23.925-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gzip is earlier than 0:1.3.3-13.rhel3" test_ref="oval:org.mitre.oval:tst:32961"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gzip is earlier than 0:1.3.3-16.rhel4" test_ref="oval:org.mitre.oval:tst:32979"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11211" version="5" class="vulnerability">
      <metadata>
        <title>The output_add_rewrite_var function in PHP before 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which allows remote attackers to obtain potentially sensitive information by reading the requests for this URL, as demonstrated by a rewritten form containing a local session ID.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5899"/>
        <description>The output_add_rewrite_var function in PHP before 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which allows remote attackers to obtain potentially sensitive information by reading the requests for this URL, as demonstrated by a rewritten form containing a local session ID.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:54.204-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:09.628-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:50.448-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11211 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:22.457-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:22.970-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:37185"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:36983"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:36761"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:37254"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:37280"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:36584"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:37255"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37302"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37269"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:36771"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:36854"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37155"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37143"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:36781"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37125"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37202"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37223"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37010"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37319"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37113"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37239"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:36927"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37138"/>
            <criterion comment="php-common is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37146"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37179"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37204"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:36955"/>
            <criterion comment="php is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37260"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37282"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:36878"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37114"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:36634"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37118"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37283"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37127"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37086"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37328"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37036"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37144"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37165"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11210" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the Infiniband dissector in Wireshark 1.0.6 through 1.2.0, when running on unspecified platforms, allows remote attackers to cause a denial of service (crash) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563"/>
        <description>Unspecified vulnerability in the Infiniband dissector in Wireshark 1.0.6 through 1.2.0, when running on unspecified platforms, allows remote attackers to cause a denial of service (crash) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:48.928-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:09.320-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:50.133-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11210 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:28.543-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:22.397-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:39600"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-EL3.6" test_ref="oval:org.mitre.oval:tst:40430"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:40437"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el4_8.5" test_ref="oval:org.mitre.oval:tst:39877"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40351"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.11-1.el5_5.5" test_ref="oval:org.mitre.oval:tst:40208"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11208" version="5" class="vulnerability">
      <metadata>
        <title>The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2869"/>
        <description>The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:24.696-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:08.102-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:48.742-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11208 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:42.706-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:21.581-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34409"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34257"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34432"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33988"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33721"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33693"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34313"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34281"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:33894"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.1.el3" test_ref="oval:org.mitre.oval:tst:34228"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:33625"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33931"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33844"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.1.el4" test_ref="oval:org.mitre.oval:tst:34331"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34334"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34021"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34249"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.8.el4" test_ref="oval:org.mitre.oval:tst:34293"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.1.el4" test_ref="oval:org.mitre.oval:tst:34371"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34446"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34262"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34366"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:33994"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-2.el4" test_ref="oval:org.mitre.oval:tst:34322"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:34445"/>
            <criterion comment="yelp is earlier than 0:2.16.0-15.el5" test_ref="oval:org.mitre.oval:tst:33445"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-11.el5" test_ref="oval:org.mitre.oval:tst:34323"/>
            <criterion comment="devhelp is earlier than 0:0.12-11.el5" test_ref="oval:org.mitre.oval:tst:34204"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:34162"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-1.el5" test_ref="oval:org.mitre.oval:tst:33979"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11207" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.  NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792"/>
        <description>Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.  NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:23.169-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:07.710-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:48.392-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11207 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:51.177-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:20.992-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="hpijs is earlier than 0:7.05-32.1.20" test_ref="oval:org.mitre.oval:tst:38025"/>
            <criterion comment="ghostscript-devel is earlier than 0:7.05-32.1.20" test_ref="oval:org.mitre.oval:tst:38598"/>
            <criterion comment="ghostscript is earlier than 0:7.05-32.1.20" test_ref="oval:org.mitre.oval:tst:38506"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ghostscript-devel is earlier than 0:7.07-33.2.el4_7.8" test_ref="oval:org.mitre.oval:tst:38482"/>
            <criterion comment="ghostscript is earlier than 0:7.07-33.2.el4_7.8" test_ref="oval:org.mitre.oval:tst:38656"/>
            <criterion comment="ghostscript-gtk is earlier than 0:7.07-33.2.el4_7.8" test_ref="oval:org.mitre.oval:tst:38408"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ghostscript-devel is earlier than 0:8.15.2-9.4.el5_3.7" test_ref="oval:org.mitre.oval:tst:38588"/>
            <criterion comment="ghostscript is earlier than 0:8.15.2-9.4.el5_3.7" test_ref="oval:org.mitre.oval:tst:38629"/>
            <criterion comment="ghostscript-gtk is earlier than 0:8.15.2-9.4.el5_3.7" test_ref="oval:org.mitre.oval:tst:38457"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11206" version="5" class="vulnerability">
      <metadata>
        <title>The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337"/>
        <description>The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:09.211-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:07.092-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:47.687-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11206 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:26.849-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:20.173-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39591"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39396"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39586"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39171"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39299"/>
            <criterion comment="kernel is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39151"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39468"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:39460"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-63.EL" test_ref="oval:org.mitre.oval:tst:38810"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38666"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38450"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38769"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:37790"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38592"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38678"/>
            <criterion comment="kernel is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38363"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38714"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38581"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38538"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-89.EL" test_ref="oval:org.mitre.oval:tst:38439"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38663"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38680"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38674"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38654"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38700"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38368"/>
            <criterion comment="kernel is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38726"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38390"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38547"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38412"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38701"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-128.1.10.el5" test_ref="oval:org.mitre.oval:tst:38129"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11204" version="5" class="vulnerability">
      <metadata>
        <title>lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929.  NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690"/>
        <description>lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929.  NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:37.886-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:06.598-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:47.196-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11204 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:34:40.411-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:19.376-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-11.3" test_ref="oval:org.mitre.oval:tst:37424"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-18.2.el4_7.1" test_ref="oval:org.mitre.oval:tst:37925"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="lynx is earlier than 0:2.8.5-28.1.el5_2.1" test_ref="oval:org.mitre.oval:tst:37898"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11203" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-3432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3432"/>
        <description>Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:50.812-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:06.286-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:46.823-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11203 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:48.487-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:18.694-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37217"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37049"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37429"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37390"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37492"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37521"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37326"/>
            <criterion comment="vim is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:36926"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37520"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37284"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11202" version="5" class="vulnerability">
      <metadata>
        <title>A regression fix in Mozilla Firefox 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the InstallTrigger.install method, which leads to memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790"/>
        <description>A regression fix in Mozilla Firefox 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the InstallTrigger.install method, which leads to memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:14.826-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:05.747-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:46.308-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11202 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:31.990-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:18.063-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11201" version="5" class="vulnerability">
      <metadata>
        <title>Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via (1) the "Send page" functionality, (2) certain responses from a malicious POP3 server, or (3) a link containing a non-ASCII hostname.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0902"/>
        <description>Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via (1) the "Send page" functionality, (2) certain responses from a malicious POP3 server, or (3) a link containing a non-ASCII hostname.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:59.569-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:05.450-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:45.958-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11201 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:27:00.394-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:33:32.968-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:17.638-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30915"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30964"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30905"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30635"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:31000"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30111"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30762"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:31048"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30856"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30834"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11199" version="5" class="vulnerability">
      <metadata>
        <title>The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546"/>
        <description>The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:17.629-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:04.632-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:44.931-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11199 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:32.242-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:16.577-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39717"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39629"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39915"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39741"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:40003"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39901"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-54.ent" test_ref="oval:org.mitre.oval:tst:39326"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39619"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39111"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39417"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39642"/>
            <criterion comment="php is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39899"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39821"/>
            <criterion comment="gd-progs is earlier than 0:2.0.28-5.4E.el4_8.1" test_ref="oval:org.mitre.oval:tst:39615"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39627"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39886"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39848"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39908"/>
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39580"/>
            <criterion comment="gd-devel is earlier than 0:2.0.28-5.4E.el4_8.1" test_ref="oval:org.mitre.oval:tst:39670"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39927"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:40010"/>
            <criterion comment="gd is earlier than 0:2.0.28-5.4E.el4_8.1" test_ref="oval:org.mitre.oval:tst:39559"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.29" test_ref="oval:org.mitre.oval:tst:39461"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39883"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39544"/>
            <criterion comment="php-common is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39804"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39875"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39748"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39802"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39854"/>
            <criterion comment="php is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39053"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39980"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39581"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39954"/>
            <criterion comment="gd-progs is earlier than 0:2.0.33-9.4.el5_4.2" test_ref="oval:org.mitre.oval:tst:39488"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39018"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39463"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39634"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39436"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39969"/>
            <criterion comment="gd-devel is earlier than 0:2.0.33-9.4.el5_4.2" test_ref="oval:org.mitre.oval:tst:39698"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39664"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39913"/>
            <criterion comment="gd is earlier than 0:2.0.33-9.4.el5_4.2" test_ref="oval:org.mitre.oval:tst:39431"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-24.el5_4.5" test_ref="oval:org.mitre.oval:tst:39765"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11198" version="5" class="vulnerability">
      <metadata>
        <title>initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables when /sbin/service is executed, which allows local users with sudo permissions for /sbin/service to gain root privileges via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3629"/>
        <description>initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables when /sbin/service is executed, which allows local users with sudo permissions for /sbin/service to gain root privileges via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:54.685-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:04.398-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:44.674-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11198 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:24.987-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:16.197-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="initscripts is earlier than 0:7.31.30.EL-1" test_ref="oval:org.mitre.oval:tst:32225"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="initscripts is earlier than 0:7.93.24.EL-1.1" test_ref="oval:org.mitre.oval:tst:32220"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11197" version="5" class="vulnerability">
      <metadata>
        <title>The rawprint function in the ISAKMP decoding routines (print-isakmp.c) for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via malformed ISAKMP packets that cause invalid "len" or "loc" values to be used in a loop, a different vulnerability than CVE-2003-0989.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0057"/>
        <description>The rawprint function in the ISAKMP decoding routines (print-isakmp.c) for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via malformed ISAKMP packets that cause invalid "len" or "loc" values to be used in a loop, a different vulnerability than CVE-2003-0989.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:14.383-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:04.212-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:44.457-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11197 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:22.375-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:15.847-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="libpcap is earlier than 14:0.7.2-7.E3.1" test_ref="oval:org.mitre.oval:tst:30562"/>
          <criterion comment="tcpdump is earlier than 14:3.7.2-7.E3.1" test_ref="oval:org.mitre.oval:tst:30488"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11195" version="5" class="vulnerability">
      <metadata>
        <title>The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1072"/>
        <description>The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:51.743-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:03.576-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:43.640-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11195 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:30.837-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:15.085-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30934"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30708"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30577"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30874"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30794"/>
          <criterion comment="kernel is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30892"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30873"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:31080"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-20.0.1.EL" test_ref="oval:org.mitre.oval:tst:30866"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11194" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681"/>
        <description>Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:54.111-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:03.284-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:43.292-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11194 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:05.700-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:14.585-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38023"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38321"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38000"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38041"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38236"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38085"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11193" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0353"/>
        <description>Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:26.641-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:02.290-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:42.273-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11193 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:14.818-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:13.762-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38173"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38181"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38221"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38323"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38337"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:37355"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38135"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38326"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.32.el3" test_ref="oval:org.mitre.oval:tst:38186"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38184"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-3.el4" test_ref="oval:org.mitre.oval:tst:38343"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-19.el4" test_ref="oval:org.mitre.oval:tst:38238"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38228"/>
            <criterion comment="firefox is earlier than 0:3.0.6-1.el4" test_ref="oval:org.mitre.oval:tst:37823"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-3.el4" test_ref="oval:org.mitre.oval:tst:37923"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:37943"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-3.el4" test_ref="oval:org.mitre.oval:tst:38172"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:37433"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38309"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-35.el4" test_ref="oval:org.mitre.oval:tst:38278"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:37933"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:37808"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:37350"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.21-1.el5" test_ref="oval:org.mitre.oval:tst:37944"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:37835"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:37556"/>
            <criterion comment="firefox is earlier than 0:3.0.6-1.el5" test_ref="oval:org.mitre.oval:tst:38272"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:38040"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-4.el5" test_ref="oval:org.mitre.oval:tst:37867"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11191" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.1 and Mozilla before 1.7.6, when displaying the HTTP Authentication dialog, do not change the focus to the tab that generated the prompt, which could facilitate spoofing and phishing attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0584"/>
        <description>Firefox before 1.0.1 and Mozilla before 1.7.6, when displaying the HTTP Authentication dialog, do not change the focus to the tab that generated the prompt, which could facilitate spoofing and phishing attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:14.514-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:01.638-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:41.587-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11191 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:53:30.868-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:12.389-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="firefox is earlier than 0:1.0.1-1.4.3" test_ref="oval:org.mitre.oval:tst:31118"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11188" version="5" class="vulnerability">
      <metadata>
        <title>Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808"/>
        <description>Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:37.690-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:08:01.084-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:40.918-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11188 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:15.113-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:11.463-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:37450"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:38284"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:38008"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.4-12.el3" test_ref="oval:org.mitre.oval:tst:38245"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38414"/>
            <criterion comment="freetype-demos is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38395"/>
            <criterion comment="freetype-devel is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38442"/>
            <criterion comment="freetype-utils is earlier than 0:2.1.9-10.el4.7" test_ref="oval:org.mitre.oval:tst:38234"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freetype is earlier than 0:2.2.1-20.el5_2" test_ref="oval:org.mitre.oval:tst:37321"/>
            <criterion comment="freetype-demos is earlier than 0:2.2.1-20.el5_2" test_ref="oval:org.mitre.oval:tst:37312"/>
            <criterion comment="freetype-devel is earlier than 0:2.2.1-20.el5_2" test_ref="oval:org.mitre.oval:tst:37160"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11186" version="5" class="vulnerability">
      <metadata>
        <title>The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022"/>
        <description>The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:51.102-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:59.903-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:39.682-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11186 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:41.838-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:09.942-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-17.el4" test_ref="oval:org.mitre.oval:tst:37872"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.18-1.el5" test_ref="oval:org.mitre.oval:tst:38015"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11185" version="5" class="vulnerability">
      <metadata>
        <title>The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908"/>
        <description>The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:00.858-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:58.990-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:38.886-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11185 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:03.783-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:08.999-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33459"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33371"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33748"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33090"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33419"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33665"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33475"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33282"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33636"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33548"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33156"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33407"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33562"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33500"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33725"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33105"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33501"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33691"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33662"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33087"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33640"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:32784"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33240"/>
            <criterion comment="php-common is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33527"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33617"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33561"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33385"/>
            <criterion comment="php is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33615"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33526"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33747"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33735"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33403"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33686"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33502"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33666"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33508"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33652"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33676"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33784"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33706"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11184" version="5" class="vulnerability">
      <metadata>
        <title>The TIFF decoder in ImageMagick before 6.0 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0760"/>
        <description>The TIFF decoder in ImageMagick before 6.0 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:51.555-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:58.760-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:38.624-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11184 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:42:27.523-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:08.541-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30471"/>
          <criterion comment="ImageMagick is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30355"/>
          <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30877"/>
          <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30918"/>
          <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30938"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11180" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflows in (1) try_netscape_proxy and (2) try_squid_eplf for lftp 2.6.9 and earlier allow remote HTTP servers to execute arbitrary code via long directory names that are processed by the ls or rels commands.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0963"/>
        <description>Buffer overflows in (1) try_netscape_proxy and (2) try_squid_eplf for lftp 2.6.9 and earlier allow remote HTTP servers to execute arbitrary code via long directory names that are processed by the ls or rels commands.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:51.586-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:57.522-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:37.291-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11180 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:06.712-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:06.659-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="lftp is earlier than 0:2.6.3-5" test_ref="oval:org.mitre.oval:tst:30427"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11176" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabilities than CVE-2004-0990.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941"/>
        <description>Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabilities than CVE-2004-0990.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:08.149-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:56.440-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:36.093-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11176 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:43:00.327-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:52:59.168-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:04.751-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gd is earlier than 0:1.8.4-12.3.1" test_ref="oval:org.mitre.oval:tst:31045"/>
            <criterion comment="gd-devel is earlier than 0:1.8.4-12.3.1" test_ref="oval:org.mitre.oval:tst:31109"/>
            <criterion comment="gd-progs is earlier than 0:1.8.4-12.3.1" test_ref="oval:org.mitre.oval:tst:31083"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gd is earlier than 0:2.0.28-4.4E.1" test_ref="oval:org.mitre.oval:tst:32218"/>
            <criterion comment="gd-devel is earlier than 0:2.0.28-4.4E.1" test_ref="oval:org.mitre.oval:tst:32334"/>
            <criterion comment="gd-progs is earlier than 0:2.0.28-4.4E.1" test_ref="oval:org.mitre.oval:tst:32294"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11175" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1307"/>
        <description>Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:39.982-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:56.247-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:35.816-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11175 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:12.207-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:04.478-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="libtiff is earlier than 0:3.5.7-20.1" test_ref="oval:org.mitre.oval:tst:31042"/>
          <criterion comment="libtiff-devel is earlier than 0:3.5.7-20.1" test_ref="oval:org.mitre.oval:tst:31022"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11174" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404"/>
        <description>Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:05.764-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:55.704-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:35.304-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11174 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:35:00.132-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:43:36.941-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:03.787-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38261"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38777"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38528"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38998"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38804"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38780"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38691"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38019"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38293"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.41.el3" test_ref="oval:org.mitre.oval:tst:38982"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-devel is earlier than 0:3.12.3.99.3-1.el4_8.2" test_ref="oval:org.mitre.oval:tst:38342"/>
            <criterion comment="nspr is earlier than 0:4.7.4-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:38829"/>
            <criterion comment="nss is earlier than 0:3.12.3.99.3-1.el4_8.2" test_ref="oval:org.mitre.oval:tst:38630"/>
            <criterion comment="nss-tools is earlier than 0:3.12.3.99.3-1.el4_8.2" test_ref="oval:org.mitre.oval:tst:38960"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.4-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:38731"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.3.99.3-1.el5_3.2" test_ref="oval:org.mitre.oval:tst:38999"/>
            <criterion comment="nss-devel is earlier than 0:3.12.3.99.3-1.el5_3.2" test_ref="oval:org.mitre.oval:tst:38609"/>
            <criterion comment="nspr is earlier than 0:4.7.4-1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38995"/>
            <criterion comment="nss is earlier than 0:3.12.3.99.3-1.el5_3.2" test_ref="oval:org.mitre.oval:tst:38950"/>
            <criterion comment="nss-tools is earlier than 0:3.12.3.99.3-1.el5_3.2" test_ref="oval:org.mitre.oval:tst:38841"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.4-1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38823"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1117" version="1" class="vulnerability">
      <metadata>
        <title>mlock Memory Page Tracking Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>Linux kernel</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0491"/>
        <description>The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock page count when one process unlocks pages that belong to another process, which allows local users to mlock more memory than specified by the rlimit.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-29T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-29T06:49:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria comment="Software section" operator="AND">
        <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
        <criteria operator="OR" comment="kernel, kernel-smp or kernel-hugemem RPM earlier than 0:2.4.21-32.0.1.EL">
          <criterion comment="kernel RPM earlier than 0:2.4.21-32.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1148"/>
          <criterion comment="kernel-hugemem RPM earlier than 0:2.4.21-32.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1147"/>
          <criterion comment="kernel-smp RPM earlier than 0:2.4.21-32.0.1.EL" negate="false" test_ref="oval:org.mitre.oval:tst:1146"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11169" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cookies in caches, may cause Set-Cookie headers to be sent to other users, which allows attackers to steal the related cookies.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0626"/>
        <description>Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cookies in caches, may cause Set-Cookie headers to be sent to other users, which allows attackers to steal the related cookies.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:43.701-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:54.783-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:34.301-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11169 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:31.620-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:02.461-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.13" test_ref="oval:org.mitre.oval:tst:31246"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.9" test_ref="oval:org.mitre.oval:tst:31854"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11165" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632"/>
        <description>Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:22.713-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:53.461-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:32.682-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11165 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:13.083-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:12:00.628-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="netpbm is earlier than 0:9.24-11.30.4" test_ref="oval:org.mitre.oval:tst:32233"/>
          <criterion comment="netpbm-progs is earlier than 0:9.24-11.30.4" test_ref="oval:org.mitre.oval:tst:32304"/>
          <criterion comment="netpbm-devel is earlier than 0:9.24-11.30.4" test_ref="oval:org.mitre.oval:tst:32108"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11164" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via "an invalid and non-sensical ordering of table-related tags" that results in a negative array index.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748"/>
        <description>Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via "an invalid and non-sensical ordering of table-related tags" that results in a negative array index.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:21.571-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:52.918-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:32.161-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11164 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:44.213-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:59.925-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11163" version="5" class="vulnerability">
      <metadata>
        <title>GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241"/>
        <description>GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:58.188-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:52.385-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:31.501-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11163 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:51.548-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:59.210-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36547"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36570"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36574"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35661"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36605"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35672"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35874"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36533"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36355"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36379"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36587"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:35752"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-10.el4" test_ref="oval:org.mitre.oval:tst:36259"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36586"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36333"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36500"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.14.el4" test_ref="oval:org.mitre.oval:tst:35884"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36540"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36602"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36557"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36221"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36566"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36305"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-11.el5_1" test_ref="oval:org.mitre.oval:tst:36619"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11162" version="5" class="vulnerability">
      <metadata>
        <title>The cert_TestHostName function in Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, only checks the hostname portion of a certificate when the hostname portion of the URI is not a fully qualified domain name (FQDN), which allows remote attackers to spoof trusted certificates.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0765"/>
        <description>The cert_TestHostName function in Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, only checks the hostname portion of a certificate when the hostname portion of the URI is not a fully qualified domain name (FQDN), which allows remote attackers to spoof trusted certificates.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:38.596-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:52.087-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:31.169-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11162 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:43.257-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:58.808-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11159" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.  NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137"/>
        <description>Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.  NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:04.004-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:50.732-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:29.690-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11159 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:05.687-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:57.345-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="qt-config is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:34921"/>
            <criterion comment="qt is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:35117"/>
            <criterion comment="qt-devel is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:35255"/>
            <criterion comment="qt-MySQL is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:35041"/>
            <criterion comment="qt-ODBC is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:34922"/>
            <criterion comment="qt-designer is earlier than 1:3.1.2-17.RHEL3" test_ref="oval:org.mitre.oval:tst:35004"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="qt-config is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35085"/>
            <criterion comment="qt is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35125"/>
            <criterion comment="qt-devel is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35050"/>
            <criterion comment="qt-PostgreSQL is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35175"/>
            <criterion comment="qt-MySQL is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:34568"/>
            <criterion comment="qt-ODBC is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:34886"/>
            <criterion comment="qt-designer is earlier than 1:3.3.3-13.RHEL4" test_ref="oval:org.mitre.oval:tst:35054"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="qt-config is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:34806"/>
            <criterion comment="qt is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:34816"/>
            <criterion comment="qt-MySQL is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:34466"/>
            <criterion comment="qt-ODBC is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:35271"/>
            <criterion comment="qt-designer is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:34736"/>
            <criterion comment="qt-devel is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:35097"/>
            <criterion comment="qt-PostgreSQL is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:35149"/>
            <criterion comment="qt-devel-docs is earlier than 1:3.3.6-23.el5" test_ref="oval:org.mitre.oval:tst:35114"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11158" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 1.5.0.9 and 2.0.0.1, and SeaMonkey before 1.0.8 allow remote attackers to execute arbitrary code via JavaScript onUnload handlers that modify the structure of a document, wich triggers memory corruption due to the lack of a finalize hook on DOM window objects.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1092"/>
        <description>Mozilla Firefox 1.5.0.9 and 2.0.0.1, and SeaMonkey before 1.0.8 allow remote attackers to execute arbitrary code via JavaScript onUnload handlers that modify the structure of a document, wich triggers memory corruption due to the lack of a finalize hook on DOM window objects.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:53.627-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:50.231-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:29.164-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11158 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:06.964-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:56.684-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33391"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33688"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33675"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33724"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33510"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33409"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33467"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33658"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33649"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el3" test_ref="oval:org.mitre.oval:tst:33381"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:32760"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33554"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33648"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:32765"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33712"/>
            <criterion comment="seamonkey is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33705"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33379"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.7.el4" test_ref="oval:org.mitre.oval:tst:33400"/>
            <criterion comment="firefox is earlier than 0:1.5.0.10-0.1.el4" test_ref="oval:org.mitre.oval:tst:33759"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33678"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33695"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33697"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33244"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.8-0.2.el4" test_ref="oval:org.mitre.oval:tst:33645"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11156" version="5" class="vulnerability">
      <metadata>
        <title>Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-2028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2028"/>
        <description>Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:22.220-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:49.853-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:28.743-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11156 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:45.344-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:56.175-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="freeradius is earlier than 0:1.0.1-2.RHEL3.4" test_ref="oval:org.mitre.oval:tst:33848"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freeradius-mysql is earlier than 0:1.0.1-3.RHEL4.5" test_ref="oval:org.mitre.oval:tst:33896"/>
            <criterion comment="freeradius-unixODBC is earlier than 0:1.0.1-3.RHEL4.5" test_ref="oval:org.mitre.oval:tst:33347"/>
            <criterion comment="freeradius is earlier than 0:1.0.1-3.RHEL4.5" test_ref="oval:org.mitre.oval:tst:34215"/>
            <criterion comment="freeradius-postgresql is earlier than 0:1.0.1-3.RHEL4.5" test_ref="oval:org.mitre.oval:tst:33852"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="freeradius-mysql is earlier than 0:1.1.3-1.2.el5" test_ref="oval:org.mitre.oval:tst:34157"/>
            <criterion comment="freeradius-unixODBC is earlier than 0:1.1.3-1.2.el5" test_ref="oval:org.mitre.oval:tst:33406"/>
            <criterion comment="freeradius is earlier than 0:1.1.3-1.2.el5" test_ref="oval:org.mitre.oval:tst:34112"/>
            <criterion comment="freeradius-postgresql is earlier than 0:1.1.3-1.2.el5" test_ref="oval:org.mitre.oval:tst:33854"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11154" version="5" class="vulnerability">
      <metadata>
        <title>CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417"/>
        <description>CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:28.349-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:48.789-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:27.800-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11154 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:03.513-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:55.017-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36256"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36236"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35996"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36279"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36046"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36052"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36034"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36284"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35748"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35994"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36164"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36050"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36193"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36093"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36053"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.10.el4" test_ref="oval:org.mitre.oval:tst:35919"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35600"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36141"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35397"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36203"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:36281"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:35480"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11153" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla before 1.7 allows remote web servers to read arbitrary files via Javascript that sets the value of an input type="file" tag.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0759"/>
        <description>Mozilla before 1.7 allows remote web servers to read arbitrary files via Javascript that sets the value of an &lt;input type="file"> tag.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:04.854-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:48.495-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:27.468-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11153 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:34.666-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:54.638-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11152" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to spoof the extensions of files to download via the Content-Disposition header, which could be used to trick users into downloading dangerous content.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0586"/>
        <description>Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to spoof the extensions of files to download via the Content-Disposition header, which could be used to trick users into downloading dangerous content.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:05.608-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:48.160-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:27.101-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11152 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:03:17.472-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:54.184-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="firefox is earlier than 0:1.0.1-1.4.3" test_ref="oval:org.mitre.oval:tst:31118"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11150" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in ImageMagick before 6.1.8 allows remote attackers to cause a denial of service (application crash) via a crafted PSD file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0761"/>
        <description>Unknown vulnerability in ImageMagick before 6.1.8 allows remote attackers to cause a denial of service (application crash) via a crafted PSD file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:52.821-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:47.506-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:26.392-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11150 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:59:00.488-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:02:58.767-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:53.346-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30471"/>
          <criterion comment="ImageMagick is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30355"/>
          <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30877"/>
          <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30918"/>
          <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30938"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11149" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387"/>
        <description>Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:34.576-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:46.730-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:25.586-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11149 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:49.102-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:52.378-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.10" test_ref="oval:org.mitre.oval:tst:34658"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.10" test_ref="oval:org.mitre.oval:tst:34842"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.10" test_ref="oval:org.mitre.oval:tst:34798"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.45" test_ref="oval:org.mitre.oval:tst:34753"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.10" test_ref="oval:org.mitre.oval:tst:34413"/>
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.45" test_ref="oval:org.mitre.oval:tst:34436"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.10" test_ref="oval:org.mitre.oval:tst:34841"/>
            <criterion comment="xpdf is earlier than 1:2.02-10.RHEL3" test_ref="oval:org.mitre.oval:tst:34945"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.10" test_ref="oval:org.mitre.oval:tst:34721"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.45" test_ref="oval:org.mitre.oval:tst:34745"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.8" test_ref="oval:org.mitre.oval:tst:34583"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-4.RHEL4" test_ref="oval:org.mitre.oval:tst:34861"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.8" test_ref="oval:org.mitre.oval:tst:34394"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-4.RHEL4" test_ref="oval:org.mitre.oval:tst:34314"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.8" test_ref="oval:org.mitre.oval:tst:34143"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.20.2" test_ref="oval:org.mitre.oval:tst:34428"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.8" test_ref="oval:org.mitre.oval:tst:34900"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7" test_ref="oval:org.mitre.oval:tst:34693"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.20.2" test_ref="oval:org.mitre.oval:tst:34799"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.8" test_ref="oval:org.mitre.oval:tst:34822"/>
            <criterion comment="xpdf is earlier than 1:3.00-12.RHEL4" test_ref="oval:org.mitre.oval:tst:34599"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.8" test_ref="oval:org.mitre.oval:tst:34702"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.8" test_ref="oval:org.mitre.oval:tst:34643"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.20.2" test_ref="oval:org.mitre.oval:tst:34757"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-2.el5" test_ref="oval:org.mitre.oval:tst:34637"/>
            <criterion comment="cups-lpd is earlier than 1:1.2.4-11.5.3.el5" test_ref="oval:org.mitre.oval:tst:34703"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.1.el5" test_ref="oval:org.mitre.oval:tst:34259"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-2.el5" test_ref="oval:org.mitre.oval:tst:34899"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.1.el5" test_ref="oval:org.mitre.oval:tst:34090"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.1.el5" test_ref="oval:org.mitre.oval:tst:34876"/>
            <criterion comment="cups-libs is earlier than 1:1.2.4-11.5.3.el5" test_ref="oval:org.mitre.oval:tst:34847"/>
            <criterion comment="tetex is earlier than 0:3.0-33.1.el5" test_ref="oval:org.mitre.oval:tst:34952"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.1.el5" test_ref="oval:org.mitre.oval:tst:34695"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.1.el5" test_ref="oval:org.mitre.oval:tst:34785"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.1.el5" test_ref="oval:org.mitre.oval:tst:34961"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.1.el5" test_ref="oval:org.mitre.oval:tst:34926"/>
            <criterion comment="cups-devel is earlier than 1:1.2.4-11.5.3.el5" test_ref="oval:org.mitre.oval:tst:34800"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.1.el5" test_ref="oval:org.mitre.oval:tst:34882"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.1.el5" test_ref="oval:org.mitre.oval:tst:34652"/>
            <criterion comment="cups is earlier than 1:1.2.4-11.5.3.el5" test_ref="oval:org.mitre.oval:tst:34651"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11147" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996"/>
        <description>Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:42.998-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:45.748-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:24.522-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11147 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:32.821-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:50.664-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35216"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35012"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34787"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35164"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34818"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35171"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34820"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35008"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34796"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35363"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35010"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35249"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34683"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34365"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34976"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35087"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35298"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35289"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35309"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35263"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35279"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34964"/>
            <criterion comment="php-common is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34896"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35084"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35078"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34802"/>
            <criterion comment="php is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35270"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35361"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34769"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35108"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35037"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34943"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34689"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35221"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35077"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34934"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35170"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34376"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34764"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11146" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0094"/>
        <description>Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:05.957-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:45.521-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:24.265-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11146 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:47.092-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:50.298-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.7" test_ref="oval:org.mitre.oval:tst:30954"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.3" test_ref="oval:org.mitre.oval:tst:31281"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11145" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0417"/>
        <description>Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:02.783-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:45.334-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:24.060-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11145 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:23.906-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:50.001-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="cvs is earlier than 0:1.11.2-24" test_ref="oval:org.mitre.oval:tst:30480"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11144" version="5" class="vulnerability">
      <metadata>
        <title>Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1137"/>
        <description>Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:43.621-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:44.886-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:23.582-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11144 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:00.368-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:49.488-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:31101"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30944"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30205"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30752"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30999"/>
            <criterion comment="kernel is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30940"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:31177"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30903"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30786"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30633"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31009"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30369"/>
            <criterion comment="kernel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:31205"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30421"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30594"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-5.0.3.EL" test_ref="oval:org.mitre.oval:tst:30616"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11141" version="5" class="vulnerability">
      <metadata>
        <title>Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0807"/>
        <description>Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:58.809-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:44.108-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:22.570-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11141 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:26.513-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:48.407-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="samba-common is earlier than 0:3.0.7-1.3E" test_ref="oval:org.mitre.oval:tst:30580"/>
          <criterion comment="samba-swat is earlier than 0:3.0.7-1.3E" test_ref="oval:org.mitre.oval:tst:30191"/>
          <criterion comment="samba-client is earlier than 0:3.0.7-1.3E" test_ref="oval:org.mitre.oval:tst:30913"/>
          <criterion comment="samba is earlier than 0:3.0.7-1.3E" test_ref="oval:org.mitre.oval:tst:30778"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11138" version="5" class="vulnerability">
      <metadata>
        <title>The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0774"/>
        <description>The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:12.555-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:43.154-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:21.546-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11138 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:18.142-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:46.934-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38413"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38419"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38110"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38217"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37995"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37833"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38347"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38410"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:37953"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.34.el3" test_ref="oval:org.mitre.oval:tst:38386"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:37842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-19.el4" test_ref="oval:org.mitre.oval:tst:38238"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38355"/>
            <criterion comment="firefox is earlier than 0:3.0.7-1.el4" test_ref="oval:org.mitre.oval:tst:38405"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38148"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38132"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38204"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-38.el4" test_ref="oval:org.mitre.oval:tst:38364"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38168"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:37685"/>
            <criterion comment="firefox is earlier than 0:3.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38372"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.21-1.el5" test_ref="oval:org.mitre.oval:tst:37944"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.7-1.el5" test_ref="oval:org.mitre.oval:tst:38365"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11137" version="5" class="vulnerability">
      <metadata>
        <title>The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0077"/>
        <description>The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:44.662-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:42.790-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:21.232-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11137 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:38.806-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:46.562-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-9.0.1.EL" test_ref="oval:org.mitre.oval:tst:30613"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-9.0.1.EL" test_ref="oval:org.mitre.oval:tst:30096"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-9.0.1.EL" test_ref="oval:org.mitre.oval:tst:30089"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-9.0.1.EL" test_ref="oval:org.mitre.oval:tst:30548"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-9.0.1.EL" test_ref="oval:org.mitre.oval:tst:30520"/>
          <criterion comment="kernel is earlier than 0:2.4.21-9.0.1.EL" test_ref="oval:org.mitre.oval:tst:30661"/>
          <criterion comment="s390utils is earlier than 2:1.2.4-3" test_ref="oval:org.mitre.oval:tst:30656"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-9.0.1.EL" test_ref="oval:org.mitre.oval:tst:30187"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-9.0.1.EL" test_ref="oval:org.mitre.oval:tst:30188"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-9.0.1.EL" test_ref="oval:org.mitre.oval:tst:30573"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11136" version="5" class="vulnerability">
      <metadata>
        <title>The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory.  NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0535"/>
        <description>The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory.  NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:23.934-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:42.506-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:20.871-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11136 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:14.291-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:46.195-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30827"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30622"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30627"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30676"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30823"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30750"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30596"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30833"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30830"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11135" version="5" class="vulnerability">
      <metadata>
        <title>Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216"/>
        <description>Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:24.913-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:42.096-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:20.451-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11135 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:37.628-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:45.539-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.2.7-61" test_ref="oval:org.mitre.oval:tst:33590"/>
            <criterion comment="krb5 is earlier than 0:1.2.7-61" test_ref="oval:org.mitre.oval:tst:33826"/>
            <criterion comment="krb5-libs is earlier than 0:1.2.7-61" test_ref="oval:org.mitre.oval:tst:32858"/>
            <criterion comment="krb5-server is earlier than 0:1.2.7-61" test_ref="oval:org.mitre.oval:tst:33622"/>
            <criterion comment="krb5-devel is earlier than 0:1.2.7-61" test_ref="oval:org.mitre.oval:tst:33700"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.3.4-46" test_ref="oval:org.mitre.oval:tst:33804"/>
            <criterion comment="krb5 is earlier than 0:1.3.4-46" test_ref="oval:org.mitre.oval:tst:33812"/>
            <criterion comment="krb5-libs is earlier than 0:1.3.4-46" test_ref="oval:org.mitre.oval:tst:33795"/>
            <criterion comment="krb5-server is earlier than 0:1.3.4-46" test_ref="oval:org.mitre.oval:tst:32895"/>
            <criterion comment="krb5-devel is earlier than 0:1.3.4-46" test_ref="oval:org.mitre.oval:tst:33816"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="krb5-workstation is earlier than 0:1.5-23" test_ref="oval:org.mitre.oval:tst:33344"/>
            <criterion comment="krb5 is earlier than 0:1.5-23" test_ref="oval:org.mitre.oval:tst:33714"/>
            <criterion comment="krb5-libs is earlier than 0:1.5-23" test_ref="oval:org.mitre.oval:tst:33831"/>
            <criterion comment="krb5-server is earlier than 0:1.5-23" test_ref="oval:org.mitre.oval:tst:33885"/>
            <criterion comment="krb5-devel is earlier than 0:1.5-23" test_ref="oval:org.mitre.oval:tst:33785"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11134" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1186"/>
        <description>Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:59.882-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:41.817-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:20.209-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11134 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:47.828-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:45.194-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="enscript is earlier than 0:1.6.1-24.4" test_ref="oval:org.mitre.oval:tst:30796"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="enscript is earlier than 0:1.6.1-28.3" test_ref="oval:org.mitre.oval:tst:31274"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11133" version="5" class="vulnerability">
      <metadata>
        <title>mod_disk_cache in Apache 2.0 through 2.0.49 stores client headers, including authentication information, on the hard disk, which could allow local users to gain sensitive information.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1834"/>
        <description>mod_disk_cache in Apache 2.0 through 2.0.49 stores client headers, including authentication information, on the hard disk, which could allow local users to gain sensitive information.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:56.428-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:41.570-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:19.928-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11133 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:05.406-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:44.867-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-44.ent" test_ref="oval:org.mitre.oval:tst:30849"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-44.ent" test_ref="oval:org.mitre.oval:tst:30832"/>
          <criterion comment="httpd is earlier than 0:2.0.46-44.ent" test_ref="oval:org.mitre.oval:tst:30989"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11132" version="5" class="vulnerability">
      <metadata>
        <title>Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572"/>
        <description>Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:24.872-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:41.104-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:19.527-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11132 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:39.684-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:44.333-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.9-1.3E.14.1" test_ref="oval:org.mitre.oval:tst:35031"/>
            <criterion comment="samba-swat is earlier than 0:3.0.9-1.3E.14.1" test_ref="oval:org.mitre.oval:tst:35544"/>
            <criterion comment="samba-client is earlier than 0:3.0.9-1.3E.14.1" test_ref="oval:org.mitre.oval:tst:35435"/>
            <criterion comment="samba is earlier than 0:3.0.9-1.3E.14.1" test_ref="oval:org.mitre.oval:tst:35042"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.25b-1.el4_6.2" test_ref="oval:org.mitre.oval:tst:35587"/>
            <criterion comment="samba-swat is earlier than 0:3.0.25b-1.el4_6.2" test_ref="oval:org.mitre.oval:tst:35430"/>
            <criterion comment="samba-client is earlier than 0:3.0.25b-1.el4_6.2" test_ref="oval:org.mitre.oval:tst:35567"/>
            <criterion comment="samba is earlier than 0:3.0.25b-1.el4_6.2" test_ref="oval:org.mitre.oval:tst:35285"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="samba-common is earlier than 0:3.0.25b-1.el5_1.2" test_ref="oval:org.mitre.oval:tst:34598"/>
            <criterion comment="samba-swat is earlier than 0:3.0.25b-1.el5_1.2" test_ref="oval:org.mitre.oval:tst:35588"/>
            <criterion comment="samba-client is earlier than 0:3.0.25b-1.el5_1.2" test_ref="oval:org.mitre.oval:tst:35579"/>
            <criterion comment="samba is earlier than 0:3.0.25b-1.el5_1.2" test_ref="oval:org.mitre.oval:tst:35226"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11130" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spawn windows without user interface components such as the address and status bar, which could be used to conduct spoofing or phishing attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2707"/>
        <description>Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spawn windows without user interface components such as the address and status bar, which could be used to conduct spoofing or phishing attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:23.848-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:40.325-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:18.688-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11130 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:10.970-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:43.353-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32169"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:31729"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32242"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32151"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32014"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32144"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32068"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32248"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32293"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.1.3.2" test_ref="oval:org.mitre.oval:tst:32044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32244"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32012"/>
            <criterion comment="mozilla is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:31897"/>
            <criterion comment="thunderbird is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:31477"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32300"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32226"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32289"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.7" test_ref="oval:org.mitre.oval:tst:32170"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32150"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32302"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32090"/>
            <criterion comment="firefox is earlier than 0:1.0.7-1.4.1" test_ref="oval:org.mitre.oval:tst:32147"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32209"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.12-1.4.1" test_ref="oval:org.mitre.oval:tst:32088"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11129" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the ReadSGIImage function in sgi.c in ImageMagick before 6.2.9 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via large (1) bytes_per_pixel, (2) columns, and (3) rows values, which trigger a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4144"/>
        <description>Integer overflow in the ReadSGIImage function in sgi.c in ImageMagick before 6.2.9 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via large (1) bytes_per_pixel, (2) columns, and (3) rows values, which trigger a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:16.244-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:39.933-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:18.339-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11129 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:03.261-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:42.877-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32037"/>
            <criterion comment="ImageMagick is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32699"/>
            <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32588"/>
            <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32852"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-20" test_ref="oval:org.mitre.oval:tst:32735"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ImageMagick-c++-devel is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32383"/>
            <criterion comment="ImageMagick is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32971"/>
            <criterion comment="ImageMagick-perl is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32748"/>
            <criterion comment="ImageMagick-devel is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32946"/>
            <criterion comment="ImageMagick-c++ is earlier than 0:6.0.7.1-16" test_ref="oval:org.mitre.oval:tst:32537"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11128" version="5" class="vulnerability">
      <metadata>
        <title>The FileStore capability in CGI::Session for Ruby before 1.8.1, and possibly PStore, creates files with insecure permissions, which can allow local users to steal session information and hijack sessions.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0755"/>
        <description>The FileStore capability in CGI::Session for Ruby before 1.8.1, and possibly PStore, creates files with insecure permissions, which can allow local users to steal session information and hijack sessions.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:21.096-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:39.716-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:18.091-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11128 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:41.833-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:42.580-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ruby-mode is earlier than 0:1.6.8-9.EL3.2" test_ref="oval:org.mitre.oval:tst:30648"/>
          <criterion comment="ruby-devel is earlier than 0:1.6.8-9.EL3.2" test_ref="oval:org.mitre.oval:tst:30909"/>
          <criterion comment="ruby is earlier than 0:1.6.8-9.EL3.2" test_ref="oval:org.mitre.oval:tst:30352"/>
          <criterion comment="ruby-libs is earlier than 0:1.6.8-9.EL3.2" test_ref="oval:org.mitre.oval:tst:30845"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11127" version="5" class="vulnerability">
      <metadata>
        <title>The DBLink module in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21, when local trust or ident authentication is used, allows remote attackers to gain privileges via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3278.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601"/>
        <description>The DBLink module in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21, when local trust or ident authentication is used, allows remote attackers to gain privileges via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3278.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:40.542-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:38.919-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:17.374-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11127 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:56.924-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:41.689-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:36102"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35807"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35304"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35743"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35830"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35938"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35951"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35406"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35943"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35867"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.21-1" test_ref="oval:org.mitre.oval:tst:35930"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35948"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35993"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36045"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35949"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36098"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36066"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35942"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36105"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35835"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:35597"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.19-1.el4_6.1" test_ref="oval:org.mitre.oval:tst:36094"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35261"/>
            <criterion comment="postgresql-docs is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35907"/>
            <criterion comment="postgresql-pl is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35319"/>
            <criterion comment="postgresql-tcl is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35123"/>
            <criterion comment="postgresql-libs is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35894"/>
            <criterion comment="postgresql-contrib is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35781"/>
            <criterion comment="postgresql-python is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:36109"/>
            <criterion comment="postgresql-test is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35308"/>
            <criterion comment="postgresql-server is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:35856"/>
            <criterion comment="postgresql-devel is earlier than 0:8.1.11-1.el5_1.1" test_ref="oval:org.mitre.oval:tst:36044"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11126" version="5" class="vulnerability">
      <metadata>
        <title>mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0748"/>
        <description>mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:36.645-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:38.675-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:17.140-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11126 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:53.158-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:41.379-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-38.ent" test_ref="oval:org.mitre.oval:tst:30679"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-38.ent" test_ref="oval:org.mitre.oval:tst:30662"/>
          <criterion comment="httpd is earlier than 0:2.0.46-38.ent" test_ref="oval:org.mitre.oval:tst:30443"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11123" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0827"/>
        <description>Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:41.528-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:37.846-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:16.235-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11123 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:00.489-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:40.213-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-7" test_ref="oval:org.mitre.oval:tst:30831"/>
          <criterion comment="ImageMagick is earlier than 0:5.5.6-7" test_ref="oval:org.mitre.oval:tst:31150"/>
          <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-7" test_ref="oval:org.mitre.oval:tst:30857"/>
          <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-7" test_ref="oval:org.mitre.oval:tst:31132"/>
          <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-7" test_ref="oval:org.mitre.oval:tst:30848"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11122" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.5 does not prevent use of document.write to replace an IFRAME (1) during the load stage or (2) in the case of an about:blank frame, which allows remote attackers to display arbitrary HTML or execute certain JavaScript code, as demonstrated by code that intercepts keystroke values from window.event, aka the "promiscuous IFRAME access bug," a related issue to CVE-2006-4568.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089"/>
        <description>Mozilla Firefox before 2.0.0.5 does not prevent use of document.write to replace an IFRAME (1) during the load stage or (2) in the case of an about:blank frame, which allows remote attackers to display arbitrary HTML or execute certain JavaScript code, as demonstrated by code that intercepts keystroke values from window.event, aka the "promiscuous IFRAME access bug," a related issue to CVE-2006-4568.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:56.533-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:37.322-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:15.602-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11122 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:07.298-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:39.469-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:33986"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34827"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34839"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34762"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34814"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34694"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34925"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34723"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34747"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34968"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34971"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.3.el4" test_ref="oval:org.mitre.oval:tst:34888"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34868"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34492"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34775"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.3.el4" test_ref="oval:org.mitre.oval:tst:34828"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34981"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34335"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34957"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34608"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34810"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34667"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34869"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11121" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802"/>
        <description>Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:45.704-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:36.685-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:14.924-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11121 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:08:46.873-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:38.658-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37286"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37033"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37126"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37105"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37271"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37279"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37060"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:37189"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36476"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.20.el3" test_ref="oval:org.mitre.oval:tst:36916"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37192"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-14.el4" test_ref="oval:org.mitre.oval:tst:36999"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36886"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37331"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36365"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.19.el4" test_ref="oval:org.mitre.oval:tst:37174"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37226"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36766"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37320"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:36826"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-16.3.el4_6" test_ref="oval:org.mitre.oval:tst:37274"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37107"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:37351"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.16-1.el5" test_ref="oval:org.mitre.oval:tst:37363"/>
            <criterion comment="xulrunner is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36984"/>
            <criterion comment="devhelp is earlier than 0:0.12-17.el5" test_ref="oval:org.mitre.oval:tst:37234"/>
            <criterion comment="yelp is earlier than 0:2.16.0-19.el5" test_ref="oval:org.mitre.oval:tst:37291"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9-1.el5" test_ref="oval:org.mitre.oval:tst:36436"/>
            <criterion comment="firefox is earlier than 0:3.0-2.el5" test_ref="oval:org.mitre.oval:tst:36814"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11119" version="5" class="vulnerability">
      <metadata>
        <title>ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0756"/>
        <description>ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:30.835-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:36.010-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:14.231-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11119 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:36.411-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:37.629-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
            <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31896"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31885"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31861"/>
            <criterion comment="kernel is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31550"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31914"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:31924"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-22.EL" test_ref="oval:org.mitre.oval:tst:32023"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11117" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1768"/>
        <description>Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:36.926-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:35.732-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:13.862-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11117 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:35.576-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:37.252-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
          <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11113" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1177"/>
        <description>Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:41.207-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:34.909-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:12.852-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11113 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:09:53.695-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:35.986-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="mailman is earlier than 3:2.1.5-25.rhel3" test_ref="oval:org.mitre.oval:tst:31464"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="mailman is earlier than 3:2.1.5-33.rhel4" test_ref="oval:org.mitre.oval:tst:31552"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11111" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0106"/>
        <description>Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:33.384-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:34.376-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:12.288-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11111 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:04:00.787-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:10:21.530-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:35.380-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30567"/>
          <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30064"/>
          <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30460"/>
          <criterion comment="XFree86-libs is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:29952"/>
          <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30100"/>
          <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30258"/>
          <criterion comment="XFree86-twm is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30560"/>
          <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30714"/>
          <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30316"/>
          <criterion comment="XFree86-doc is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30669"/>
          <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:29808"/>
          <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:29998"/>
          <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30273"/>
          <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30537"/>
          <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:29649"/>
          <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30610"/>
          <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30489"/>
          <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30530"/>
          <criterion comment="XFree86-xdm is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30518"/>
          <criterion comment="XFree86 is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30588"/>
          <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30206"/>
          <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30113"/>
          <criterion comment="XFree86-xfs is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30525"/>
          <criterion comment="XFree86-tools is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30631"/>
          <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30636"/>
          <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30500"/>
          <criterion comment="XFree86-xauth is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30123"/>
          <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30593"/>
          <criterion comment="XFree86-devel is earlier than 0:4.3.0-55.EL" test_ref="oval:org.mitre.oval:tst:30503"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11109" version="5" class="vulnerability">
      <metadata>
        <title>Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw.  NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298.  NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2712"/>
        <description>Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw.  NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298.  NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:31.199-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:33.704-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:11.611-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11109 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:50.552-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:34.446-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37217"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37049"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37429"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37390"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37492"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37521"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37326"/>
            <criterion comment="vim is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:36926"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37520"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37284"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37412"/>
            <criterion comment="vim-enhanced is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37218"/>
            <criterion comment="vim is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37405"/>
            <criterion comment="vim-X11 is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37384"/>
            <criterion comment="vim-common is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37365"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11108" version="5" class="vulnerability">
      <metadata>
        <title>gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367"/>
        <description>gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:06.236-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:33.076-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:10.892-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11108 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:24.097-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:33.596-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35915"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35794"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36513"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36264"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36161"/>
            <criterion comment="kernel is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36518"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36597"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36612"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36171"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36972"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36412"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36840"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36741"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36936"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36433"/>
            <criterion comment="kernel is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36961"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36949"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36894"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:36367"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-67.0.20.EL" test_ref="oval:org.mitre.oval:tst:37020"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36107"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36600"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36529"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36526"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36442"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36238"/>
            <criterion comment="kernel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36463"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36480"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:35876"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36532"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36278"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:35724"/>
            <criterion comment="kernel-debuginfo-common is earlier than 0:2.6.18-53.1.19.el5" test_ref="oval:org.mitre.oval:tst:36560"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11107" version="5" class="vulnerability">
      <metadata>
        <title>The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0206"/>
        <description>The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:04.796-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:32.717-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:10.496-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11107 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:28.803-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:33.152-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.27" test_ref="oval:org.mitre.oval:tst:30818"/>
            <criterion comment="xpdf is earlier than 1:2.02-9.6" test_ref="oval:org.mitre.oval:tst:30695"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.27" test_ref="oval:org.mitre.oval:tst:31392"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.27" test_ref="oval:org.mitre.oval:tst:31250"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gpdf is earlier than 0:2.8.2-4.3" test_ref="oval:org.mitre.oval:tst:30790"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:30919"/>
            <criterion comment="xpdf is earlier than 1:3.00-11.5" test_ref="oval:org.mitre.oval:tst:30331"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:31056"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.6" test_ref="oval:org.mitre.oval:tst:31093"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11104" version="5" class="vulnerability">
      <metadata>
        <title>crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron files of other users by changing the file being edited to a symlink.  NOTE: there is insufficient information to know whether this is a duplicate of CVE-2001-0235.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1038"/>
        <description>crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron files of other users by changing the file being edited to a symlink.  NOTE: there is insufficient information to know whether this is a duplicate of CVE-2001-0235.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:22.616-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:32.296-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:09.372-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11104 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:36.701-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:32.347-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="vixie-cron is earlier than 0:4.1-10.EL3" test_ref="oval:org.mitre.oval:tst:32494"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="vixie-cron is earlier than 4:4.1-36.EL4" test_ref="oval:org.mitre.oval:tst:31057"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11101" version="5" class="vulnerability">
      <metadata>
        <title>traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1767"/>
        <description>traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:06.813-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:31.256-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:08.231-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11101 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:53.847-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:31.520-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31411"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31953"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31879"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31990"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31485"/>
          <criterion comment="kernel is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32093"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31968"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:32148"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-37.EL" test_ref="oval:org.mitre.oval:tst:31741"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11099" version="5" class="vulnerability">
      <metadata>
        <title>GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3490"/>
        <description>GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:35.586-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:30.680-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:07.633-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11099 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:30.522-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:30.659-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="wget is earlier than 0:1.10.2-0.30E.1" test_ref="oval:org.mitre.oval:tst:39672"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="wget is earlier than 0:1.10.2-1.el4_8.1" test_ref="oval:org.mitre.oval:tst:39136"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="wget is earlier than 0:1.11.4-2.el5_4.1" test_ref="oval:org.mitre.oval:tst:39024"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11098" version="5" class="vulnerability">
      <metadata>
        <title>Directory traversal vulnerability in extract.c in star before 1.5a84 allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4134"/>
        <description>Directory traversal vulnerability in extract.c in star before 1.5a84 allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:29.140-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:30.426-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:07.360-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11098 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:35.791-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:30.216-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="star is earlier than 0:1.5a08-5" test_ref="oval:org.mitre.oval:tst:35154"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="star is earlier than 0:1.5a25-8" test_ref="oval:org.mitre.oval:tst:34243"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="star is earlier than 0:1.5a75-2" test_ref="oval:org.mitre.oval:tst:34991"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11093" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1773"/>
        <description>Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:10.690-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:29.533-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:06.360-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11093 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:26.394-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:28.821-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="sharutils is earlier than 0:4.2.1-16.2" test_ref="oval:org.mitre.oval:tst:31587"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="sharutils is earlier than 0:4.2.1-22.2" test_ref="oval:org.mitre.oval:tst:31528"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11092" version="5" class="vulnerability">
      <metadata>
        <title>The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988"/>
        <description>The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:34.294-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:28.655-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:05.536-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11092 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:21.597-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:27.897-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33459"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33371"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33748"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33090"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33419"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33665"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33475"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33282"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33636"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33548"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33156"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33407"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33562"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33500"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33725"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33105"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33501"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33691"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33662"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33087"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33640"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:32784"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33240"/>
            <criterion comment="php-common is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33527"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33617"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33561"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33385"/>
            <criterion comment="php is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33615"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33526"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33747"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33735"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33403"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33686"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33502"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33666"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33508"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33652"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33676"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33784"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33706"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11090" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla allows remote attackers to cause Mozilla to open a URI as a different MIME type than expected via a null character (%00) in an FTP URI.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0760"/>
        <description>Mozilla allows remote attackers to cause Mozilla to open a URI as a different MIME type than expected via a null character (%00) in an FTP URI.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:33.153-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:26.289-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:03.011-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11090 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:30.763-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:25.159-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11088" version="5" class="vulnerability">
      <metadata>
        <title>LHA 1.14 and earlier allows attackers to execute arbitrary commands via a directory with shell metacharacters in its name.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0745"/>
        <description>LHA 1.14 and earlier allows attackers to execute arbitrary commands via a directory with shell metacharacters in its name.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:05.523-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:25.818-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:02.468-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11088 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:09:05.218-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:24.510-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="lha is earlier than 0:1.14i-10.4" test_ref="oval:org.mitre.oval:tst:29793"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11086" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4486"/>
        <description>Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:45.691-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:24.909-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:01.487-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11086 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:33.983-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:23.846-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32928"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32870"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32829"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32485"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32258"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32491"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32860"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32985"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32962"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32808"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32175"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32788"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:33059"/>
            <criterion comment="php is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32754"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32876"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:33047"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32483"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:33052"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32964"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32700"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32272"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11085" version="5" class="vulnerability">
      <metadata>
        <title>Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1335"/>
        <description>Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:43.736-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:24.631-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:01.172-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11085 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:36.291-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:23.450-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:31101"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30944"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30205"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30752"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30999"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30940"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:31177"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30903"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.1.EL" test_ref="oval:org.mitre.oval:tst:30786"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11084" version="5" class="vulnerability">
      <metadata>
        <title>PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue.  NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1490"/>
        <description>PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue.  NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:47.600-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:24.182-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:08:00.664-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11084 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:11.970-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:22.811-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32579"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32613"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32711"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32425"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32166"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32107"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32695"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:31742"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32509"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32606"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32503"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32185"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32639"/>
            <criterion comment="php is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32546"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32577"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32236"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32578"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32591"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32707"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32547"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:31727"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11082" version="5" class="vulnerability">
      <metadata>
        <title>OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to conduct unauthorized activities via an OpenOffice document with a malicious BASIC macro, which is executed without prompting the user.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2198"/>
        <description>OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to conduct unauthorized activities via an OpenOffice document with a malicious BASIC macro, which is executed without prompting the user.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:45.260-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:23.521-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:59.934-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11082 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:23.296-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:21.883-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-34.2.0.EL3" test_ref="oval:org.mitre.oval:tst:32211"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-34.2.0.EL3" test_ref="oval:org.mitre.oval:tst:32773"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-34.2.0.EL3" test_ref="oval:org.mitre.oval:tst:31834"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32763"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32657"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32835"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-34.6.0.EL4" test_ref="oval:org.mitre.oval:tst:32791"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11080" version="5" class="vulnerability">
      <metadata>
        <title>The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838"/>
        <description>The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:25.004-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:22.776-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:59.180-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11080 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:42.859-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:20.800-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38336"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38452"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38736"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38742"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38069"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38264"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38724"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38791"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:38432"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.38.el3" test_ref="oval:org.mitre.oval:tst:37902"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38793"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-23.el4" test_ref="oval:org.mitre.oval:tst:38562"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38213"/>
            <criterion comment="firefox is earlier than 0:3.0.11-4.el4" test_ref="oval:org.mitre.oval:tst:38689"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38280"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38531"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38828"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-43.el4_8" test_ref="oval:org.mitre.oval:tst:38655"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38771"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38371"/>
            <criterion comment="firefox is earlier than 0:3.0.11-2.el5_3" test_ref="oval:org.mitre.oval:tst:38682"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.22-2.el5_3" test_ref="oval:org.mitre.oval:tst:38801"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.11-3.el5_3" test_ref="oval:org.mitre.oval:tst:38718"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11078" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233"/>
        <description>Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:01.629-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:21.996-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:58.344-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11078 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:31.792-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:19.737-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36547"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36570"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36574"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35661"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36605"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35672"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35874"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36533"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36355"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36379"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36587"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:35752"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-10.el4" test_ref="oval:org.mitre.oval:tst:36259"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36586"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36333"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36500"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.14.el4" test_ref="oval:org.mitre.oval:tst:35884"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36540"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36602"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36557"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36221"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36566"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36305"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-11.el5_1" test_ref="oval:org.mitre.oval:tst:36619"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11077" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504"/>
        <description>Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:51.318-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:21.488-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:57.784-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11077 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:54.549-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:19.099-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32785"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33227"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33266"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33146"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32352"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33183"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33095"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33300"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32996"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33263"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33195"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33229"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32844"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33273"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33259"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33239"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33284"/>
            <criterion comment="firefox is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32815"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33153"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33015"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33251"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33336"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32408"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11074" version="5" class="vulnerability">
      <metadata>
        <title>Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058"/>
        <description>Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:48.506-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:20.716-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:56.944-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11074 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:26.762-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:17.848-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="sendmail is earlier than 0:8.12.11-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:32623"/>
            <criterion comment="sendmail-doc is earlier than 0:8.12.11-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:32643"/>
            <criterion comment="sendmail-cf is earlier than 0:8.12.11-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:31735"/>
            <criterion comment="sendmail-devel is earlier than 0:8.12.11-4.RHEL3.4" test_ref="oval:org.mitre.oval:tst:32467"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="sendmail is earlier than 0:8.13.1-3.RHEL4.3" test_ref="oval:org.mitre.oval:tst:32556"/>
            <criterion comment="sendmail-doc is earlier than 0:8.13.1-3.RHEL4.3" test_ref="oval:org.mitre.oval:tst:32379"/>
            <criterion comment="sendmail-cf is earlier than 0:8.13.1-3.RHEL4.3" test_ref="oval:org.mitre.oval:tst:32409"/>
            <criterion comment="sendmail-devel is earlier than 0:8.13.1-3.RHEL4.3" test_ref="oval:org.mitre.oval:tst:31921"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11072" version="5" class="vulnerability">
      <metadata>
        <title>gdb before 6.3 searches the current working directory to load the .gdbinit configuration file, which allows local users to execute arbitrary commands as the user running gdb.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1705"/>
        <description>gdb before 6.3 searches the current working directory to load the .gdbinit configuration file, which allows local users to execute arbitrary commands as the user running gdb.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:09.762-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:19.664-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:55.839-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11072 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:08.973-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:17.497-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gdb is earlier than 0:6.3.0.0-1.62" test_ref="oval:org.mitre.oval:tst:29887"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gdb is earlier than 0:6.3.0.0-1.63" test_ref="oval:org.mitre.oval:tst:32136"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11071" version="5" class="vulnerability">
      <metadata>
        <title>Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0367"/>
        <description>Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:40.335-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:19.474-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:55.627-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11071 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:44.829-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:17.010-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.10.3-0.30E.1" test_ref="oval:org.mitre.oval:tst:29720"/>
          <criterion comment="ethereal is earlier than 0:0.10.3-0.30E.1" test_ref="oval:org.mitre.oval:tst:30448"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:1107" version="1" class="vulnerability">
      <metadata>
        <title>gzip zgrep Sanitation Vulnerability</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <product>gzip</product>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758"/>
        <description>zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.</description>
        <oval_repository>
          <dates>
            <submitted date="2005-06-20T12:00:00.000-04:00">
              <contributor organization="Bastille Linux">Jay Beale</contributor>
            </submitted>
            <status_change date="2005-06-22T12:38:00.000-04:00">DRAFT</status_change>
            <status_change date="2005-07-27T10:37:00.000-04:00">INTERIM</status_change>
            <status_change date="2005-08-18T07:37:00.000-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria comment="Software section" operator="AND">
          <criterion comment="Red Hat Enterprise 3 is installed" negate="false" test_ref="oval:org.mitre.oval:tst:2861"/>
          <criterion comment="gzip RPM earlier than 0:1.3.3-12rhel3" negate="false" test_ref="oval:org.mitre.oval:tst:2667"/>
        </criteria>
        <criteria comment="Configuration section" operator="AND">
          <criterion comment="/usr/bin/zgrep is executable by any user" negate="false" test_ref="oval:org.mitre.oval:tst:1162"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11066" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735"/>
        <description>Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:06.477-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:17.530-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:53.625-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11066 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:12:37.656-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:14.738-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:33986"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34827"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34839"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34762"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34814"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34694"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34925"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34723"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.3.el3" test_ref="oval:org.mitre.oval:tst:34747"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34968"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34971"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.3.el4" test_ref="oval:org.mitre.oval:tst:34888"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34868"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34492"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34775"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.3.el4" test_ref="oval:org.mitre.oval:tst:34828"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34981"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34335"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34957"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34550"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-4.el4" test_ref="oval:org.mitre.oval:tst:34608"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34810"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34667"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-3.el5" test_ref="oval:org.mitre.oval:tst:34869"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11065" version="5" class="vulnerability">
      <metadata>
        <title>Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788"/>
        <description>Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:43.949-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:16.958-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:53.106-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11065 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:30.818-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:14.110-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32575"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32674"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32919"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32864"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32659"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32859"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32902"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.2-0.1.0.EL3" test_ref="oval:org.mitre.oval:tst:32837"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32810"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11062" version="5" class="vulnerability">
      <metadata>
        <title>scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4020"/>
        <description>scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:29.467-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:15.855-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:51.401-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11062 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:12:59.996-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:12.491-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32928"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32870"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32829"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32485"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32258"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32491"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-36.ent" test_ref="oval:org.mitre.oval:tst:32860"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32985"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32962"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32808"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32175"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32788"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:33059"/>
            <criterion comment="php is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32754"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32876"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:33047"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32483"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:33052"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32964"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32700"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.18" test_ref="oval:org.mitre.oval:tst:32272"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11060" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 to 0.10.12, when the "Dissect unknown RPC program numbers" option is enabled, allows remote attackers to cause a denial of service (memory consumption).</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3245"/>
        <description>Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 to 0.10.12, when the "Dissect unknown RPC program numbers" option is enabled, allows remote attackers to cause a denial of service (memory consumption).</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:04.521-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:15.137-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:50.546-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11060 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:59.452-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:11.414-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32189"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32138"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32341"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32202"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11059" version="5" class="vulnerability">
      <metadata>
        <title>socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666"/>
        <description>socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:53.233-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:14.835-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:50.253-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11059 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:12:47.336-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:10.925-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.2.0-3.el3.5" test_ref="oval:org.mitre.oval:tst:38901"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.2.5-6.0.1.el4_8.1" test_ref="oval:org.mitre.oval:tst:39046"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.3.6-1.1.el5_3.1" test_ref="oval:org.mitre.oval:tst:39380"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11057" version="5" class="vulnerability">
      <metadata>
        <title>Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228"/>
        <description>Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:42.949-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:14.313-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:49.621-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11057 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:53.081-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:10.109-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="gzip is earlier than 0:1.3.3-12.rhel3" test_ref="oval:org.mitre.oval:tst:30880"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="gzip is earlier than 0:1.3.3-15.rhel4" test_ref="oval:org.mitre.oval:tst:31566"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11056" version="5" class="vulnerability">
      <metadata>
        <title>Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1158"/>
        <description>Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:01.149-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:14.098-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:49.381-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11056 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:49.094-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:09.761-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kdebase is earlier than 6:3.1.3-5.8" test_ref="oval:org.mitre.oval:tst:31113"/>
          <criterion comment="kdebase-devel is earlier than 6:3.1.3-5.8" test_ref="oval:org.mitre.oval:tst:31092"/>
          <criterion comment="kdelibs is earlier than 6:3.1.3-6.9" test_ref="oval:org.mitre.oval:tst:30244"/>
          <criterion comment="kdelibs-devel is earlier than 6:3.1.3-6.9" test_ref="oval:org.mitre.oval:tst:30826"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11054" version="5" class="vulnerability">
      <metadata>
        <title>The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037"/>
        <description>The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:59.987-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:13.739-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:48.999-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11054 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:47.694-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:09.282-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="curl-devel is earlier than 0:7.10.6-9.rhel3" test_ref="oval:org.mitre.oval:tst:38524"/>
            <criterion comment="curl is earlier than 0:7.10.6-9.rhel3" test_ref="oval:org.mitre.oval:tst:37776"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="curl-devel is earlier than 0:7.12.1-11.1.el4_7.1" test_ref="oval:org.mitre.oval:tst:38532"/>
            <criterion comment="curl is earlier than 0:7.12.1-11.1.el4_7.1" test_ref="oval:org.mitre.oval:tst:38496"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="curl-devel is earlier than 0:7.15.5-2.1.el5_3.4" test_ref="oval:org.mitre.oval:tst:38443"/>
            <criterion comment="curl is earlier than 0:7.15.5-2.1.el5_3.4" test_ref="oval:org.mitre.oval:tst:38312"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11053" version="5" class="vulnerability">
      <metadata>
        <title>The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500"/>
        <description>The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:04.718-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:13.115-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:48.312-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11053 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:25.208-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:08.384-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38137"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37886"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37999"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37907"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37709"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38092"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37745"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38039"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38062"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38073"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37574"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38071"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37857"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-18.el4" test_ref="oval:org.mitre.oval:tst:37200"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37812"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el4" test_ref="oval:org.mitre.oval:tst:38080"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37139"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37869"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37789"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37395"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38118"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:38072"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38037"/>
            <criterion comment="nspr is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37420"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37854"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.19-1.el5_2" test_ref="oval:org.mitre.oval:tst:38053"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37419"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38083"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:37631"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38114"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37737"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37403"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11052" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176"/>
        <description>Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:01.337-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:12.598-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:47.738-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11052 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:13:28.661-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:07.667-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40246"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39934"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40184"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40133"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39775"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40360"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40059"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39946"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:40114"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.52.el3" test_ref="oval:org.mitre.oval:tst:39403"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.19-1.el4" test_ref="oval:org.mitre.oval:tst:40284"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40081"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40250"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40304"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40345"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:40183"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-54.el4_8" test_ref="oval:org.mitre.oval:tst:39945"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:40265"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:39621"/>
            <criterion comment="firefox is earlier than 0:3.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:40064"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.19-1.el5_5" test_ref="oval:org.mitre.oval:tst:40164"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11050" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the GIFLZWDecompressor::GIFLZWDecompressor function in filter.vcl/lgif/decode.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, related to LZW decompression.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2950"/>
        <description>Heap-based buffer overflow in the GIFLZWDecompressor::GIFLZWDecompressor function in filter.vcl/lgif/decode.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, related to LZW decompression.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:04.502-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:10.512-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:45.517-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11050 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:09:00.343-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:14:05.178-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:05.197-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-46.2.0.EL3" test_ref="oval:org.mitre.oval:tst:40232"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-46.2.0.EL3" test_ref="oval:org.mitre.oval:tst:39552"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-46.2.0.EL3" test_ref="oval:org.mitre.oval:tst:39893"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org2-langpack-lt_LT is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39898"/>
            <criterion comment="openoffice.org2-langpack-nn_NO is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39574"/>
            <criterion comment="openoffice.org2-langpack-ga_IE is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40086"/>
            <criterion comment="openoffice.org2-langpack-zh_CN is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39814"/>
            <criterion comment="openoffice.org2-javafilter is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39321"/>
            <criterion comment="openoffice.org2-langpack-he_IL is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40079"/>
            <criterion comment="openoffice.org2-draw is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40187"/>
            <criterion comment="openoffice.org2-langpack-ko_KR is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40069"/>
            <criterion comment="openoffice.org2-langpack-ca_ES is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40280"/>
            <criterion comment="openoffice.org2-base is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39823"/>
            <criterion comment="openoffice.org2-langpack-fr is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39422"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.5-10.6.0.7.EL4.3" test_ref="oval:org.mitre.oval:tst:39760"/>
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.5-10.6.0.7.EL4.3" test_ref="oval:org.mitre.oval:tst:40078"/>
            <criterion comment="openoffice.org2-langpack-pa_IN is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40135"/>
            <criterion comment="openoffice.org2-langpack-da_DK is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40217"/>
            <criterion comment="openoffice.org2-emailmerge is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39726"/>
            <criterion comment="openoffice.org2-langpack-pt_PT is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40076"/>
            <criterion comment="openoffice.org2-langpack-es is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39500"/>
            <criterion comment="openoffice.org2-langpack-sv is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40206"/>
            <criterion comment="openoffice.org2-langpack-ms_MY is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39998"/>
            <criterion comment="openoffice.org2-langpack-cs_CZ is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40006"/>
            <criterion comment="openoffice.org2-xsltfilter is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39847"/>
            <criterion comment="openoffice.org2-langpack-ja_JP is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39962"/>
            <criterion comment="openoffice.org2-langpack-hu_HU is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39762"/>
            <criterion comment="openoffice.org2-langpack-zh_TW is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40163"/>
            <criterion comment="openoffice.org2-langpack-sl_SI is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39819"/>
            <criterion comment="openoffice.org2-langpack-de is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39506"/>
            <criterion comment="openoffice.org2-pyuno is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40275"/>
            <criterion comment="openoffice.org2 is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40058"/>
            <criterion comment="openoffice.org2-langpack-tr_TR is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40104"/>
            <criterion comment="openoffice.org2-impress is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39977"/>
            <criterion comment="openoffice.org2-langpack-bn is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40138"/>
            <criterion comment="openoffice.org2-langpack-ar is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40155"/>
            <criterion comment="openoffice.org2-langpack-pt_BR is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40266"/>
            <criterion comment="openoffice.org2-langpack-af_ZA is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40024"/>
            <criterion comment="openoffice.org2-langpack-pl_PL is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40188"/>
            <criterion comment="openoffice.org2-calc is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40123"/>
            <criterion comment="openoffice.org2-langpack-zu_ZA is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39776"/>
            <criterion comment="openoffice.org2-langpack-fi_FI is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40262"/>
            <criterion comment="openoffice.org2-langpack-sk_SK is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39872"/>
            <criterion comment="openoffice.org2-langpack-hi_IN is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39958"/>
            <criterion comment="openoffice.org2-langpack-nb_NO is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40178"/>
            <criterion comment="openoffice.org2-langpack-th_TH is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39976"/>
            <criterion comment="openoffice.org2-langpack-et_EE is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40092"/>
            <criterion comment="openoffice.org2-langpack-gl_ES is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39695"/>
            <criterion comment="openoffice.org2-langpack-it is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40167"/>
            <criterion comment="openoffice.org2-langpack-hr_HR is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39830"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.5-10.6.0.7.EL4.3" test_ref="oval:org.mitre.oval:tst:40242"/>
            <criterion comment="openoffice.org2-langpack-ta_IN is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39851"/>
            <criterion comment="openoffice.org2-langpack-gu_IN is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39818"/>
            <criterion comment="openoffice.org2-testtools is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40038"/>
            <criterion comment="openoffice.org-kde is earlier than 0:1.1.5-10.6.0.7.EL4.3" test_ref="oval:org.mitre.oval:tst:40279"/>
            <criterion comment="openoffice.org2-langpack-eu_ES is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39959"/>
            <criterion comment="openoffice.org2-langpack-el_GR is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40197"/>
            <criterion comment="openoffice.org2-core is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40245"/>
            <criterion comment="openoffice.org2-langpack-ru is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39845"/>
            <criterion comment="openoffice.org2-langpack-bg_BG is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39936"/>
            <criterion comment="openoffice.org2-langpack-nl is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39966"/>
            <criterion comment="openoffice.org2-langpack-sr_CS is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39879"/>
            <criterion comment="openoffice.org2-langpack-cy_GB is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40025"/>
            <criterion comment="openoffice.org2-math is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39786"/>
            <criterion comment="openoffice.org2-graphicfilter is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:40213"/>
            <criterion comment="openoffice.org2-writer is earlier than 1:2.0.4-5.7.0.6.1.el4_8.3" test_ref="oval:org.mitre.oval:tst:39767"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-langpack-sk_SK is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40143"/>
            <criterion comment="openoffice.org-langpack-zu_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40027"/>
            <criterion comment="openoffice.org-langpack-pa_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39796"/>
            <criterion comment="openoffice.org-langpack-hi_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39900"/>
            <criterion comment="openoffice.org-langpack-et_EE is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40033"/>
            <criterion comment="openoffice.org-langpack-kn_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39999"/>
            <criterion comment="openoffice.org is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39861"/>
            <criterion comment="openoffice.org-langpack-zh_TW is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39384"/>
            <criterion comment="openoffice.org-writer is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39209"/>
            <criterion comment="openoffice.org-langpack-ve_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40293"/>
            <criterion comment="openoffice.org-langpack-ga_IE is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40186"/>
            <criterion comment="openoffice.org-langpack-ta_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40207"/>
            <criterion comment="openoffice.org-langpack-ko_KR is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39941"/>
            <criterion comment="openoffice.org-langpack-or_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39835"/>
            <criterion comment="openoffice.org-langpack-da_DK is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39870"/>
            <criterion comment="openoffice.org-langpack-sr_CS is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40043"/>
            <criterion comment="openoffice.org-langpack-pl_PL is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40061"/>
            <criterion comment="openoffice.org-langpack-fr is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40019"/>
            <criterion comment="openoffice.org-langpack-ts_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39923"/>
            <criterion comment="openoffice.org-javafilter is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40169"/>
            <criterion comment="openoffice.org-langpack-as_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39889"/>
            <criterion comment="openoffice.org-testtools is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39388"/>
            <criterion comment="openoffice.org-langpack-hr_HR is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40015"/>
            <criterion comment="openoffice.org-langpack-de is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39455"/>
            <criterion comment="openoffice.org-emailmerge is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40278"/>
            <criterion comment="openoffice.org-xsltfilter is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39903"/>
            <criterion comment="openoffice.org-langpack-tn_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39905"/>
            <criterion comment="openoffice.org-langpack-te_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39522"/>
            <criterion comment="openoffice.org-langpack-sv is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40195"/>
            <criterion comment="openoffice.org-base is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39480"/>
            <criterion comment="openoffice.org-langpack-ca_ES is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40157"/>
            <criterion comment="openoffice.org-langpack-nr_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39989"/>
            <criterion comment="openoffice.org-core is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39975"/>
            <criterion comment="openoffice.org-langpack-nl is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40101"/>
            <criterion comment="openoffice.org-langpack-ur is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39119"/>
            <criterion comment="openoffice.org-langpack-nn_NO is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39682"/>
            <criterion comment="openoffice.org-langpack-ar is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39653"/>
            <criterion comment="openoffice.org-langpack-ja_JP is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39800"/>
            <criterion comment="openoffice.org-langpack-gu_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40203"/>
            <criterion comment="openoffice.org-langpack-tr_TR is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40119"/>
            <criterion comment="openoffice.org-langpack-eu_ES is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40002"/>
            <criterion comment="openoffice.org-langpack-fi_FI is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39764"/>
            <criterion comment="openoffice.org-graphicfilter is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39979"/>
            <criterion comment="openoffice.org-pyuno is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39996"/>
            <criterion comment="openoffice.org-langpack-ml_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40060"/>
            <criterion comment="openoffice.org-langpack-gl_ES is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40192"/>
            <criterion comment="openoffice.org-sdk-doc is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39688"/>
            <criterion comment="openoffice.org-langpack-zh_CN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39612"/>
            <criterion comment="openoffice.org-langpack-xh_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39939"/>
            <criterion comment="openoffice.org-langpack-it is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39687"/>
            <criterion comment="openoffice.org-sdk is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40190"/>
            <criterion comment="openoffice.org-langpack-es is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39972"/>
            <criterion comment="openoffice.org-langpack-nb_NO is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39792"/>
            <criterion comment="openoffice.org-langpack-sl_SI is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39914"/>
            <criterion comment="openoffice.org-draw is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39723"/>
            <criterion comment="openoffice.org-langpack-nso_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40100"/>
            <criterion comment="openoffice.org-langpack-ms_MY is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40158"/>
            <criterion comment="openoffice.org-langpack-el_GR is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39416"/>
            <criterion comment="openoffice.org-langpack-hu_HU is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39496"/>
            <criterion comment="openoffice.org-langpack-ss_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39922"/>
            <criterion comment="openoffice.org-langpack-bn is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40120"/>
            <criterion comment="openoffice.org-langpack-he_IL is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39301"/>
            <criterion comment="openoffice.org-langpack-pt_PT is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40236"/>
            <criterion comment="openoffice.org-langpack-lt_LT is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40042"/>
            <criterion comment="openoffice.org-langpack-af_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39239"/>
            <criterion comment="openoffice.org-langpack-bg_BG is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40048"/>
            <criterion comment="openoffice.org-calc is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39842"/>
            <criterion comment="openoffice.org-langpack-cs_CZ is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39995"/>
            <criterion comment="openoffice.org-langpack-cy_GB is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39641"/>
            <criterion comment="openoffice.org-langpack-mr_IN is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39754"/>
            <criterion comment="openoffice.org-headless is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40170"/>
            <criterion comment="openoffice.org-langpack-th_TH is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39951"/>
            <criterion comment="openoffice.org-langpack-pt_BR is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40166"/>
            <criterion comment="openoffice.org-langpack-ru is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40110"/>
            <criterion comment="openoffice.org-math is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40223"/>
            <criterion comment="openoffice.org-impress is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:40173"/>
            <criterion comment="openoffice.org-langpack-st_ZA is earlier than 1:2.3.0-6.11.el5_4.4" test_ref="oval:org.mitre.oval:tst:39745"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11049" version="5" class="vulnerability">
      <metadata>
        <title>vsftpd before 1.2.2, when under heavy load, allows attackers to cause a denial of service (crash) via a SIGCHLD signal during a malloc or free call, which is not re-entrant.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-2259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2259"/>
        <description>vsftpd before 1.2.2, when under heavy load, allows attackers to cause a denial of service (crash) via a SIGCHLD signal during a malloc or free call, which is not re-entrant.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:51.194-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:10.294-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:45.284-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11049 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:25.628-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:04.850-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="vsftpd is earlier than 0:1.2.1-3" test_ref="oval:org.mitre.oval:tst:30385"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11048" version="5" class="vulnerability">
      <metadata>
        <title>bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995"/>
        <description>bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:31:20.816-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:09.953-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:44.931-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11048 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:34.719-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:04.355-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="quagga is earlier than 0:0.96.2-12.3E" test_ref="oval:org.mitre.oval:tst:34316"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="quagga-devel is earlier than 0:0.98.3-2.4.0.1.el4" test_ref="oval:org.mitre.oval:tst:34117"/>
            <criterion comment="quagga is earlier than 0:0.98.3-2.4.0.1.el4" test_ref="oval:org.mitre.oval:tst:34370"/>
            <criterion comment="quagga-contrib is earlier than 0:0.98.3-2.4.0.1.el4" test_ref="oval:org.mitre.oval:tst:34203"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="quagga-devel is earlier than 0:0.98.6-2.1.0.1.el5" test_ref="oval:org.mitre.oval:tst:34212"/>
            <criterion comment="quagga is earlier than 0:0.98.6-2.1.0.1.el5" test_ref="oval:org.mitre.oval:tst:34264"/>
            <criterion comment="quagga-contrib is earlier than 0:0.98.6-2.1.0.1.el5" test_ref="oval:org.mitre.oval:tst:34361"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11047" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in LHA allows remote attackers to execute arbitrary code via long pathnames in LHarc format 2 headers for a .LHZ archive, as originally demonstrated using the "x" option but also exploitable through "l" and "v", and fixed in header.c, a different issue than CVE-2004-0771.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0769"/>
        <description>Buffer overflow in LHA allows remote attackers to execute arbitrary code via long pathnames in LHarc format 2 headers for a .LHZ archive, as originally demonstrated using the "x" option but also exploitable through "l" and "v", and fixed in header.c, a different issue than CVE-2004-0771.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:41.408-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:09.766-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:44.725-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11047 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:11.576-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:04.075-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="lha is earlier than 0:1.14i-10.4" test_ref="oval:org.mitre.oval:tst:29793"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11046" version="5" class="vulnerability">
      <metadata>
        <title>The CUPS service on multiple platforms allows remote attackers to cause a denial of service (service hang) via a "partially-negotiated" SSL connection, which prevents other requests from being accepted.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720"/>
        <description>The CUPS service on multiple platforms allows remote attackers to cause a denial of service (service hang) via a "partially-negotiated" SSL connection, which prevents other requests from being accepted.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:58.340-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:09.423-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:44.361-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11046 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:58.535-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:03.502-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.42" test_ref="oval:org.mitre.oval:tst:33418"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.42" test_ref="oval:org.mitre.oval:tst:33293"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.42" test_ref="oval:org.mitre.oval:tst:33872"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-devel is earlier than 0:1.1.22-0.rc1.9.18" test_ref="oval:org.mitre.oval:tst:33504"/>
            <criterion comment="cups is earlier than 0:1.1.22-0.rc1.9.18" test_ref="oval:org.mitre.oval:tst:33974"/>
            <criterion comment="cups-libs is earlier than 0:1.1.22-0.rc1.9.18" test_ref="oval:org.mitre.oval:tst:33999"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="cups-lpd is earlier than 0:1.2.4-11.5.1.el5" test_ref="oval:org.mitre.oval:tst:33766"/>
            <criterion comment="cups-devel is earlier than 0:1.2.4-11.5.1.el5" test_ref="oval:org.mitre.oval:tst:33927"/>
            <criterion comment="cups is earlier than 0:1.2.4-11.5.1.el5" test_ref="oval:org.mitre.oval:tst:33887"/>
            <criterion comment="cups-libs is earlier than 0:1.2.4-11.5.1.el5" test_ref="oval:org.mitre.oval:tst:33961"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11045" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429"/>
        <description>Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:20.712-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:08.478-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:43.334-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11045 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:32.588-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:02.244-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35923"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35665"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36014"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35929"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36011"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35836"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35726"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35715"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35610"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36025"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35789"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35804"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35865"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35793"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35903"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35965"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35922"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35504"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35045"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35914"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35831"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35998"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35975"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36031"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35971"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35711"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35933"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35826"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35753"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35678"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35795"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35934"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35467"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35946"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36116"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35116"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36004"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35483"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36103"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36060"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36074"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35895"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35905"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36012"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35984"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35857"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35681"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35909"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-server-sdk is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35517"/>
            <criterion comment="xorg-x11-server-Xnest is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35690"/>
            <criterion comment="xorg-x11-server-Xvfb is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35399"/>
            <criterion comment="xorg-x11-server-Xdmx is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35908"/>
            <criterion comment="xorg-x11-server-Xephyr is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35987"/>
            <criterion comment="xorg-x11-server is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35861"/>
            <criterion comment="xorg-x11-server-Xorg is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35935"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11043" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609"/>
        <description>Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:23.242-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:07.686-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:41.954-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11043 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:39.176-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:01.359-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:39543"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40032"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40389"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40303"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40329"/>
            <criterion comment="tetex-doc is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40150"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.19" test_ref="oval:org.mitre.oval:tst:40000"/>
            <criterion comment="xpdf is earlier than 1:2.02-17.el3" test_ref="oval:org.mitre.oval:tst:39361"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40095"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-15.el4_8.2" test_ref="oval:org.mitre.oval:tst:39438"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:39528"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-15.el4_8.2" test_ref="oval:org.mitre.oval:tst:39094"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40473"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40316"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_8.5" test_ref="oval:org.mitre.oval:tst:39221"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40209"/>
            <criterion comment="xpdf is earlier than 1:3.00-22.el4_8.1" test_ref="oval:org.mitre.oval:tst:38963"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40364"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.0.1.EL4.16" test_ref="oval:org.mitre.oval:tst:40077"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-15.el5_4.2" test_ref="oval:org.mitre.oval:tst:39062"/>
            <criterion comment="cups-lpd is earlier than 1:1.3.7-11.el5_4.3" test_ref="oval:org.mitre.oval:tst:39430"/>
            <criterion comment="tetex-dvips is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40312"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-15.el5_4.2" test_ref="oval:org.mitre.oval:tst:39529"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_4.11" test_ref="oval:org.mitre.oval:tst:39290"/>
            <criterion comment="tetex-fonts is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40122"/>
            <criterion comment="cups-libs is earlier than 1:1.3.7-11.el5_4.3" test_ref="oval:org.mitre.oval:tst:38854"/>
            <criterion comment="tetex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40413"/>
            <criterion comment="tetex-doc is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40398"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_4.11" test_ref="oval:org.mitre.oval:tst:39346"/>
            <criterion comment="tetex-latex is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40444"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_4.11" test_ref="oval:org.mitre.oval:tst:39383"/>
            <criterion comment="cups-devel is earlier than 1:1.3.7-11.el5_4.3" test_ref="oval:org.mitre.oval:tst:38836"/>
            <criterion comment="tetex-afm is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:40008"/>
            <criterion comment="tetex-xdvi is earlier than 0:3.0-33.8.el5_5.5" test_ref="oval:org.mitre.oval:tst:39920"/>
            <criterion comment="cups is earlier than 1:1.3.7-11.el5_4.3" test_ref="oval:org.mitre.oval:tst:39511"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11042" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the SendUidl in the POP3 capability for Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, may allow remote POP3 mail servers to execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0757"/>
        <description>Heap-based buffer overflow in the SendUidl in the POP3 capability for Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, may allow remote POP3 mail servers to execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:22.492-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:07.394-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:41.617-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11042 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:12.386-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:11:00.903-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11040" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508"/>
        <description>Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:16.413-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:05.963-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:40.527-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11040 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:41.124-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:59.643-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38137"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37886"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37999"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37907"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37709"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38092"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:37745"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38039"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38062"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.29.el3" test_ref="oval:org.mitre.oval:tst:38073"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nspr is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37574"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38071"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37857"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-18.el4" test_ref="oval:org.mitre.oval:tst:37200"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-1.el4" test_ref="oval:org.mitre.oval:tst:37918"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37812"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el4" test_ref="oval:org.mitre.oval:tst:38080"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-1.el4" test_ref="oval:org.mitre.oval:tst:37139"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37869"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37789"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:37395"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-32.el4" test_ref="oval:org.mitre.oval:tst:38118"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:38072"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38037"/>
            <criterion comment="nspr is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37420"/>
            <criterion comment="nss is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37854"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.19-1.el5_2" test_ref="oval:org.mitre.oval:tst:38053"/>
            <criterion comment="nspr-devel is earlier than 0:4.7.3-2.el5" test_ref="oval:org.mitre.oval:tst:37419"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38083"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:37631"/>
            <criterion comment="firefox is earlier than 0:3.0.5-1.el5_2" test_ref="oval:org.mitre.oval:tst:38114"/>
            <criterion comment="nss-devel is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37737"/>
            <criterion comment="nss-tools is earlier than 0:3.12.2.0-2.el5" test_ref="oval:org.mitre.oval:tst:37403"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11039" version="5" class="vulnerability">
      <metadata>
        <title>The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0137"/>
        <description>Linux kernel 2.6 on Itanium (ia64) architectures allows local users to cause a denial of service via a "missing Itanium syscall table entry."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:43.232-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:05.672-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:40.204-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11039 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:36.289-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:59.255-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31148"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31473"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31178"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31282"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31565"/>
          <criterion comment="kernel is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31562"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31582"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:30730"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-27.0.4.EL" test_ref="oval:org.mitre.oval:tst:31534"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11038" version="5" class="vulnerability">
      <metadata>
        <title>Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2136"/>
        <description>Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:53.457-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:05.002-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:39.481-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11038 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:37.260-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:58.369-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37931"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37846"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37817"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37663"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37799"/>
            <criterion comment="kernel is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37028"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37885"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37981"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-58.EL" test_ref="oval:org.mitre.oval:tst:37117"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37193"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37447"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37178"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37392"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37398"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37465"/>
            <criterion comment="kernel is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37240"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37091"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37431"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37233"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-67.0.22.EL" test_ref="oval:org.mitre.oval:tst:37493"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-kdump is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:36537"/>
            <criterion comment="kernel-debug is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:36954"/>
            <criterion comment="kernel-xen is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37079"/>
            <criterion comment="kernel-headers is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:36957"/>
            <criterion comment="kernel-kdump-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37527"/>
            <criterion comment="kernel-xen-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37262"/>
            <criterion comment="kernel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37410"/>
            <criterion comment="kernel-PAE-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37323"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37508"/>
            <criterion comment="kernel-PAE is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37153"/>
            <criterion comment="kernel-debug-devel is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37180"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.18-92.1.10.el5" test_ref="oval:org.mitre.oval:tst:37188"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11035" version="5" class="vulnerability">
      <metadata>
        <title>PHP 4.4.4, 5.1.6, and other versions, when running on Apache, allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0754"/>
        <description>PHP 4.4.4, 5.1.6, and other versions, when running on Apache, allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:55.309-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:03.735-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:38.010-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11035 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:02:18.924-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:56.367-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:38010"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37683"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37468"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37994"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37569"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37746"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-51.ent" test_ref="oval:org.mitre.oval:tst:37938"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38324"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38288"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38029"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:37974"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38154"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38499"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38401"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38018"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38505"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38494"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38075"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38387"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38058"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.15" test_ref="oval:org.mitre.oval:tst:38202"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38147"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38305"/>
            <criterion comment="php-common is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38268"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38298"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37882"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37952"/>
            <criterion comment="php is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38099"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38415"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38511"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38115"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38367"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38569"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38440"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38536"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38507"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38316"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38493"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:37667"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-23.2.el5_3" test_ref="oval:org.mitre.oval:tst:38421"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11034" version="5" class="vulnerability">
      <metadata>
        <title>PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSIONs:39:".</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1701"/>
        <description>PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:17.534-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:02.967-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:37.241-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11034 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:29.706-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:55.412-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33459"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33371"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33748"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33090"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33419"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33665"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-39.ent" test_ref="oval:org.mitre.oval:tst:33475"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33282"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33636"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33548"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33156"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33407"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33562"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33500"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33725"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33105"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33501"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33691"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33662"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33087"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.3" test_ref="oval:org.mitre.oval:tst:33640"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:32784"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33240"/>
            <criterion comment="php-common is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33527"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33617"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33561"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33385"/>
            <criterion comment="php is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33615"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33526"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33747"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33735"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33403"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33686"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33502"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33666"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33508"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33652"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33676"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33784"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33706"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11033" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0848"/>
        <description>Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:13.111-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:02.780-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:36.972-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11033 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:24.086-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:55.131-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="slocate is earlier than 0:2.7-3" test_ref="oval:org.mitre.oval:tst:30343"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11032" version="5" class="vulnerability">
      <metadata>
        <title>The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3353"/>
        <description>The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:06.485-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:02.315-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:36.470-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11032 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:00:53.598-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:54.510-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32105"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32433"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32429"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32322"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32301"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32253"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-26.ent" test_ref="oval:org.mitre.oval:tst:32050"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32261"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32003"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32346"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32114"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32325"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32420"/>
            <criterion comment="php is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32337"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32287"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32016"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32405"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32397"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32321"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:32207"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.9" test_ref="oval:org.mitre.oval:tst:31926"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11030" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Ethereal 0.9.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) an invalid display filter, or the (2) GSM SMS, (3) ASN.1-based, (4) DCERPC NT, (5) PER, (6) RPC, (7) DCERPC, and (8) ASN.1 dissectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1939"/>
        <description>Multiple unspecified vulnerabilities in Ethereal 0.9.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) an invalid display filter, or the (2) GSM SMS, (3) ASN.1-based, (4) DCERPC NT, (5) PER, (6) RPC, (7) DCERPC, and (8) ASN.1 dissectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:43.949-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:01.779-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:35.868-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11030 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:53.739-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:53.701-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.99.0-EL3.2" test_ref="oval:org.mitre.oval:tst:32590"/>
            <criterion comment="ethereal is earlier than 0:0.99.0-EL3.2" test_ref="oval:org.mitre.oval:tst:32631"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.99.0-EL4.2" test_ref="oval:org.mitre.oval:tst:32299"/>
            <criterion comment="ethereal is earlier than 0:0.99.0-EL4.2" test_ref="oval:org.mitre.oval:tst:32238"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11028" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in PHP before 5.2.4 has unknown impact and attack vectors, related to an "Improved fix for MOPB-03-2007," probably a variant of CVE-2007-1285.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4670"/>
        <description>Unspecified vulnerability in PHP before 5.2.4 has unknown impact and attack vectors, related to an "Improved fix for MOPB-03-2007," probably a variant of CVE-2007-1285.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:38.467-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:00.738-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:34.426-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11028 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:55.476-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:52.362-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35216"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35012"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34787"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35164"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34818"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:35171"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-43.ent" test_ref="oval:org.mitre.oval:tst:34820"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35008"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34796"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35363"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35010"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35249"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34683"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34365"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:34976"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35087"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35298"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35289"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35309"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35263"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.9" test_ref="oval:org.mitre.oval:tst:35044"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35279"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34964"/>
            <criterion comment="php-common is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34896"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35084"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35078"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34802"/>
            <criterion comment="php is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35270"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35361"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34769"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35108"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35037"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34943"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34689"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35221"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35077"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34934"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:35170"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34376"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-15.el5" test_ref="oval:org.mitre.oval:tst:34764"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11027" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0086"/>
        <description>Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted file, as demonstrated using the UTF-8 locale.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:23.903-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:00.547-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:34.211-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11027 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:41.943-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:52.092-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="less is earlier than 0:378-12" test_ref="oval:org.mitre.oval:tst:31193"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11026" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the MMSE dissector for Ethereal 0.10.1 to 0.10.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0507"/>
        <description>Buffer overflow in the MMSE dissector for Ethereal 0.10.1 to 0.10.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:32.229-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:07:00.355-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:33.946-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11026 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:50.566-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:51.765-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ethereal-gnome is earlier than 0:0.10.3-0.30E.2" test_ref="oval:org.mitre.oval:tst:30484"/>
          <criterion comment="ethereal is earlier than 0:0.10.3-0.30E.2" test_ref="oval:org.mitre.oval:tst:30678"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11024" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the DICOM dissector in Ethereal before 0.10.11 allows remote attackers to cause a denial of service (large memory allocation) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1466"/>
        <description>Unknown vulnerability in the DICOM dissector in Ethereal before 0.10.11 allows remote attackers to cause a denial of service (large memory allocation) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:14.296-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:59.639-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:33.250-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11024 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:50.481-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:50.796-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31458"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL3.1" test_ref="oval:org.mitre.oval:tst:31546"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31674"/>
            <criterion comment="ethereal is earlier than 0:0.10.11-1.EL4.1" test_ref="oval:org.mitre.oval:tst:31865"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11023" version="5" class="vulnerability">
      <metadata>
        <title>FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0960"/>
        <description>FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:12.978-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:59.452-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:33.003-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11023 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:11.188-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:50.531-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="freeradius is earlier than 0:1.0.1-1.RHEL3" test_ref="oval:org.mitre.oval:tst:31016"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11022" version="5" class="vulnerability">
      <metadata>
        <title>ImageMagick before 6.0 allows remote attackers to cause a denial of service (application crash) via a TIFF image with an invalid tag.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0759"/>
        <description>ImageMagick before 6.0 allows remote attackers to cause a denial of service (application crash) via a TIFF image with an invalid tag.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:16.907-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:59.217-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:32.752-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11022 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:46.439-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:50.223-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="ImageMagick-c++-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30471"/>
          <criterion comment="ImageMagick is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30355"/>
          <criterion comment="ImageMagick-perl is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30877"/>
          <criterion comment="ImageMagick-devel is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30918"/>
          <criterion comment="ImageMagick-c++ is earlier than 0:5.5.6-13" test_ref="oval:org.mitre.oval:tst:30938"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11019" version="5" class="vulnerability">
      <metadata>
        <title>The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720"/>
        <description>The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:41.785-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:58.615-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:31.301-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11019 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:45.643-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:49.340-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="expat is earlier than 0:1.95.5-6.2" test_ref="oval:org.mitre.oval:tst:39654"/>
            <criterion comment="expat-devel is earlier than 0:1.95.5-6.2" test_ref="oval:org.mitre.oval:tst:39129"/>
            <criterion comment="4Suite is earlier than 0:0.11.1-15" test_ref="oval:org.mitre.oval:tst:39666"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="expat is earlier than 0:1.95.7-4.el4_8.2" test_ref="oval:org.mitre.oval:tst:39733"/>
            <criterion comment="PyXML is earlier than 0:0.8.3-6.el4_8.2" test_ref="oval:org.mitre.oval:tst:39810"/>
            <criterion comment="expat-devel is earlier than 0:1.95.7-4.el4_8.2" test_ref="oval:org.mitre.oval:tst:39660"/>
            <criterion comment="4Suite is earlier than 0:1.0-3.el4_8.1" test_ref="oval:org.mitre.oval:tst:39576"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="expat is earlier than 0:1.95.8-8.3.el5_4.2" test_ref="oval:org.mitre.oval:tst:39521"/>
            <criterion comment="PyXML is earlier than 0:0.8.4-4.el5_4.2" test_ref="oval:org.mitre.oval:tst:39204"/>
            <criterion comment="expat-devel is earlier than 0:1.95.8-8.3.el5_4.2" test_ref="oval:org.mitre.oval:tst:39647"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11017" version="5" class="vulnerability">
      <metadata>
        <title>The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285"/>
        <description>The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:32.075-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:57.264-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:29.907-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11017 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:09:00.458-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:47.724-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33776"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33817"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33769"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33528"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33915"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33822"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33351"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:34016"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33395"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33957"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33405"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33642"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33024"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33690"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33995"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33892"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33945"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33711"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33857"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33644"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33920"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:32784"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33240"/>
            <criterion comment="php-common is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33527"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33617"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33561"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33385"/>
            <criterion comment="php is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33615"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33526"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33747"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33735"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33403"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33686"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33502"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33666"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33508"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33652"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33676"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33784"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-7.el5" test_ref="oval:org.mitre.oval:tst:33706"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11016" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows and facilitate phishing attacks, aka the "Dialog Box Spoofing Vulnerability."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0144"/>
        <description>Firefox before 1.0 and Mozilla before 1.7.5 display the secure site lock icon when a view-source: URL references a secure SSL site while an insecure page is being loaded, which could facilitate phishing attacks.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:01.864-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:56.728-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:29.382-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11016 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:25.731-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:47.084-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:30819"/>
            <criterion comment="mozilla is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31515"/>
            <criterion comment="mozilla-chat is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31278"/>
            <criterion comment="mozilla-mail is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31465"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31606"/>
            <criterion comment="mozilla-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31480"/>
            <criterion comment="mozilla-nss is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31417"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31313"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31469"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.4-1.3.5" test_ref="oval:org.mitre.oval:tst:31598"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30665"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31499"/>
            <criterion comment="mozilla is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31604"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31381"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31622"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:30651"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.3" test_ref="oval:org.mitre.oval:tst:31560"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31110"/>
            <criterion comment="evolution is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31003"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31404"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31375"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31106"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.6-1.4.1" test_ref="oval:org.mitre.oval:tst:31418"/>
            <criterion comment="evolution-devel is earlier than 0:2.0.2-14" test_ref="oval:org.mitre.oval:tst:31558"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11014" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959"/>
        <description>Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:32.803-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:55.961-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:28.582-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11014 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:07:32.728-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:45.827-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35246"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35338"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35812"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35754"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35763"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35809"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35651"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35146"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35423"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.7.el3" test_ref="oval:org.mitre.oval:tst:35775"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35664"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35628"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-7.el4" test_ref="oval:org.mitre.oval:tst:35520"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35267"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35702"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35858"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.8.el4" test_ref="oval:org.mitre.oval:tst:34811"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35523"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35602"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:35697"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-7.el4" test_ref="oval:org.mitre.oval:tst:34917"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-7.el5" test_ref="oval:org.mitre.oval:tst:35421"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-7.el5" test_ref="oval:org.mitre.oval:tst:35528"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-7.el5" test_ref="oval:org.mitre.oval:tst:35742"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11013" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812"/>
        <description>Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:45.554-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:55.488-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:28.061-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11013 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:34.420-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:44.749-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32342"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32877"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:31982"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32816"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32080"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32904"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32915"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32822"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el3.1" test_ref="oval:org.mitre.oval:tst:32555"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32873"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32693"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32886"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32418"/>
            <criterion comment="seamonkey is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32496"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32929"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.2.el4" test_ref="oval:org.mitre.oval:tst:32777"/>
            <criterion comment="firefox is earlier than 0:1.5.0.5-0.el4.1" test_ref="oval:org.mitre.oval:tst:32896"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32722"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32906"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32905"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32925"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.3-0.el4.1" test_ref="oval:org.mitre.oval:tst:32624"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11011" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103"/>
        <description>Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:23.417-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:54.446-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:26.882-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11011 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:58.559-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:43.407-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33279"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33033"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33135"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32975"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33134"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32756"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33026"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33238"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33343"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32868"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32574"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33217"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33260"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33106"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33262"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33329"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32993"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33159"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33053"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33163"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33308"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32484"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33294"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33176"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32802"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32909"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33270"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33234"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:33180"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-115.EL" test_ref="oval:org.mitre.oval:tst:32796"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33158"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33322"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33297"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33211"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33206"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33346"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33222"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33340"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33228"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33187"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33289"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33242"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33068"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33283"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33337"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:32984"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33352"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.13.37.5" test_ref="oval:org.mitre.oval:tst:33122"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11010" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-3393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393"/>
        <description>Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:48.870-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:54.113-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:26.528-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11010 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T17:02:00.876-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:08:22.181-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:42.876-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36111"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.7-EL3.1" test_ref="oval:org.mitre.oval:tst:36043"/>
            <criterion comment="libsmi is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:35411"/>
            <criterion comment="libsmi-devel is earlier than 0:0.4.5-3.el3" test_ref="oval:org.mitre.oval:tst:36140"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.6-EL4.1" test_ref="oval:org.mitre.oval:tst:34755"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.6-EL4.1" test_ref="oval:org.mitre.oval:tst:34881"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.6-1.el5" test_ref="oval:org.mitre.oval:tst:34336"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.6-1.el5" test_ref="oval:org.mitre.oval:tst:34784"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11007" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339.  NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340"/>
        <description>Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339.  NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:46.381-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:53.315-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:25.700-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11007 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:00.262-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:41.791-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32759"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32989"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32809"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32779"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32954"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32668"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33010"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32811"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32981"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33061"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:32072"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33120"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32910"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32677"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32933"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32243"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:33062"/>
            <criterion comment="firefox is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32951"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32978"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33072"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33079"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32121"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33077"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11005" version="5" class="vulnerability">
      <metadata>
        <title>The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017"/>
        <description>The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:48.212-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:50.616-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:22.968-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11005 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:20:10.650-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:38.893-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11003" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the IEEE 802.11 dissector in Wireshark (formerly Ethereal) 0.10.14 through 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0457"/>
        <description>Unspecified vulnerability in the IEEE 802.11 dissector in Wireshark (formerly Ethereal) 0.10.14 through 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:18.706-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:49.670-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:21.975-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11003 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:39.975-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:37.273-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.5-EL3.1" test_ref="oval:org.mitre.oval:tst:33506"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.5-EL3.1" test_ref="oval:org.mitre.oval:tst:33535"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.5-EL4.1" test_ref="oval:org.mitre.oval:tst:33380"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.5-EL4.1" test_ref="oval:org.mitre.oval:tst:33530"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.5-1.el5" test_ref="oval:org.mitre.oval:tst:33509"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.5-1.el5" test_ref="oval:org.mitre.oval:tst:33591"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11002" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (divide-by-zero) via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248"/>
        <description>Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (divide-by-zero) via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:10.837-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:49.427-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:21.710-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11002 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:59.304-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:36.855-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32189"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL3.1" test_ref="oval:org.mitre.oval:tst:32138"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="ethereal-gnome is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32341"/>
            <criterion comment="ethereal is earlier than 0:0.10.13-1.EL4.1" test_ref="oval:org.mitre.oval:tst:32202"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:11000" version="5" class="vulnerability">
      <metadata>
        <title>The XBM decoder in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to read uninitialized memory, and possibly obtain sensitive information in opportunistic circumstances, via a crafted XBM image file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4069"/>
        <description>The XBM decoder in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to read uninitialized memory, and possibly obtain sensitive information in opportunistic circumstances, via a crafted XBM image file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:22.192-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:48.674-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:20.834-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:11000 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T14:46:00.236-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:19:15.668-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:35.726-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37411"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36691"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37031"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37528"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36726"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37435"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37680"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:36725"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37449"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.24.el3" test_ref="oval:org.mitre.oval:tst:37356"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37564"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:36913"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37609"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.10.el4" test_ref="oval:org.mitre.oval:tst:37306"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37499"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37444"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37543"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-26.el4" test_ref="oval:org.mitre.oval:tst:37552"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10998" version="5" class="vulnerability">
      <metadata>
        <title>Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0241"/>
        <description>The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:18.490-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:47.629-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:19.872-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10998 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:30.336-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:35.366-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.7" test_ref="oval:org.mitre.oval:tst:30954"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE6-3.4E.3" test_ref="oval:org.mitre.oval:tst:31281"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10997" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0996"/>
        <description>Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:17.079-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:47.185-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:19.393-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10997 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:56.286-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:34.748-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32579"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32613"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32711"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32425"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32166"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32107"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-30.ent" test_ref="oval:org.mitre.oval:tst:32695"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:31742"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32509"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32606"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32503"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32185"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32639"/>
            <criterion comment="php is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32546"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32577"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32236"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32578"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32591"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32707"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:32547"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.12" test_ref="oval:org.mitre.oval:tst:31727"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10994" version="5" class="vulnerability">
      <metadata>
        <title>libungif library before 4.1.0 allows attackers to cause a denial of service via a crafted GIF file that triggers a null dereference.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974"/>
        <description>libungif library before 4.1.0 allows attackers to cause a denial of service via a crafted GIF file that triggers a null dereference.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:39.726-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:46.422-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:18.564-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10994 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:02.197-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:33.614-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libungif is earlier than 0:4.1.0-15.el3.3" test_ref="oval:org.mitre.oval:tst:32066"/>
            <criterion comment="libungif-devel is earlier than 0:4.1.0-15.el3.3" test_ref="oval:org.mitre.oval:tst:31940"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libungif is earlier than 0:4.1.3-1.el4.2" test_ref="oval:org.mitre.oval:tst:31956"/>
            <criterion comment="libungif-progs is earlier than 0:4.1.3-1.el4.2" test_ref="oval:org.mitre.oval:tst:32398"/>
            <criterion comment="libungif-devel is earlier than 0:4.1.3-1.el4.2" test_ref="oval:org.mitre.oval:tst:31871"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="giflib-devel is earlier than 0:4.1.3-7.1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38143"/>
            <criterion comment="giflib-utils is earlier than 0:4.1.3-7.1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38622"/>
            <criterion comment="giflib is earlier than 0:4.1.3-7.1.el5_3.1" test_ref="oval:org.mitre.oval:tst:38639"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10993" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379"/>
        <description>Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:32.451-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:46.125-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:18.240-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10993 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:13.899-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:33.140-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.0-12.el3" test_ref="oval:org.mitre.oval:tst:39336"/>
            <criterion comment="libvorbis is earlier than 1:1.0-12.el3" test_ref="oval:org.mitre.oval:tst:39681"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.0-3.el4_8.3" test_ref="oval:org.mitre.oval:tst:39730"/>
            <criterion comment="libvorbis is earlier than 1:1.1.0-3.el4_8.3" test_ref="oval:org.mitre.oval:tst:39644"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libvorbis-devel is earlier than 1:1.1.2-3.el5_4.4" test_ref="oval:org.mitre.oval:tst:39068"/>
            <criterion comment="libvorbis is earlier than 1:1.1.2-3.el5_4.4" test_ref="oval:org.mitre.oval:tst:39104"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10991" version="5" class="vulnerability">
      <metadata>
        <title>X.Org Xserver before 1.4.1 allows local users to determine the existence of arbitrary files via a filename argument in the -sp option to the X program, which produces different error messages depending on whether the filename exists.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958"/>
        <description>X.Org Xserver before 1.4.1 allows local users to determine the existence of arbitrary files via a filename argument in the -sp option to the X program, which produces different error messages depending on whether the filename exists.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:50.364-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:44.843-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:16.891-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10991 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:22.518-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:31.561-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35923"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35665"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36014"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35929"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36011"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35836"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35726"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35715"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35610"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36025"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35789"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35804"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35865"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35793"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35903"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35965"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35922"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35504"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35045"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35914"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35831"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35998"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35975"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36031"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35971"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35711"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35933"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35826"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35753"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35678"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35795"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35934"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35467"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35946"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36116"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35116"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36004"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35483"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36103"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36060"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36074"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35895"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35905"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36012"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35984"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35857"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35681"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35909"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-server-sdk is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35517"/>
            <criterion comment="xorg-x11-server-Xnest is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35690"/>
            <criterion comment="xorg-x11-server-Xvfb is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35399"/>
            <criterion comment="xorg-x11-server-Xdmx is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35908"/>
            <criterion comment="xorg-x11-server-Xephyr is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35987"/>
            <criterion comment="xorg-x11-server is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35861"/>
            <criterion comment="xorg-x11-server-Xorg is earlier than 0:1.1.1-48.26.el5_1.5" test_ref="oval:org.mitre.oval:tst:35935"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10990" version="5" class="vulnerability">
      <metadata>
        <title>Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-1198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198"/>
        <description>Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:58.396-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:44.219-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:16.239-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10990 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:53:08.673-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:30.691-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40598"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40703"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:39947"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40593"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40651"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:39843"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40800"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40736"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:39844"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40686"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.6.4-8.el4" test_ref="oval:org.mitre.oval:tst:40755"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40296"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:39850"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40624"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40782"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40431"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40449"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gnome-python2-extras is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40435"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-21.el5" test_ref="oval:org.mitre.oval:tst:40552"/>
            <criterion comment="gnome-python2-libegg is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40721"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.2.4-10.el5" test_ref="oval:org.mitre.oval:tst:40480"/>
            <criterion comment="gnome-python2-gtkhtml2 is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40813"/>
            <criterion comment="totem is earlier than 0:2.16.7-7.el5" test_ref="oval:org.mitre.oval:tst:40749"/>
            <criterion comment="xulrunner is earlier than 0:1.9.2.4-10.el5" test_ref="oval:org.mitre.oval:tst:40221"/>
            <criterion comment="gnome-python2-gtkspell is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40385"/>
            <criterion comment="yelp is earlier than 0:2.16.0-26.el5" test_ref="oval:org.mitre.oval:tst:40828"/>
            <criterion comment="devhelp is earlier than 0:0.12-21.el5" test_ref="oval:org.mitre.oval:tst:40814"/>
            <criterion comment="firefox is earlier than 0:3.6.4-8.el5" test_ref="oval:org.mitre.oval:tst:40524"/>
            <criterion comment="totem-mozplugin is earlier than 0:2.16.7-7.el5" test_ref="oval:org.mitre.oval:tst:40620"/>
            <criterion comment="gnome-python2-gtkmozembed is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40722"/>
            <criterion comment="esc is earlier than 0:1.1.0-12.el5" test_ref="oval:org.mitre.oval:tst:40273"/>
            <criterion comment="totem-devel is earlier than 0:2.16.7-7.el5" test_ref="oval:org.mitre.oval:tst:40637"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10988" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347"/>
        <description>Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:13.633-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:43.382-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:15.338-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10988 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:15.943-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:29.553-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.5.7-33.el3" test_ref="oval:org.mitre.oval:tst:38552"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-33.el3" test_ref="oval:org.mitre.oval:tst:38921"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-12.el4_8.4" test_ref="oval:org.mitre.oval:tst:38786"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-12.el4_8.4" test_ref="oval:org.mitre.oval:tst:38925"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.8.2-7.el5_3.4" test_ref="oval:org.mitre.oval:tst:38773"/>
            <criterion comment="libtiff-devel is earlier than 0:3.8.2-7.el5_3.4" test_ref="oval:org.mitre.oval:tst:37937"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10987" version="5" class="vulnerability">
      <metadata>
        <title>PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349"/>
        <description>PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:31.377-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:43.087-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:14.984-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10987 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:50.748-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:29.086-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mod_perl-devel is earlier than 0:1.99_09-12.ent" test_ref="oval:org.mitre.oval:tst:34145"/>
            <criterion comment="mod_perl is earlier than 0:1.99_09-12.ent" test_ref="oval:org.mitre.oval:tst:34220"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mod_perl-devel is earlier than 0:1.99_16-4.5" test_ref="oval:org.mitre.oval:tst:34277"/>
            <criterion comment="mod_perl is earlier than 0:1.99_16-4.5" test_ref="oval:org.mitre.oval:tst:34069"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mod_perl-devel is earlier than 0:2.0.2-6.3.el5" test_ref="oval:org.mitre.oval:tst:34267"/>
            <criterion comment="mod_perl is earlier than 0:2.0.2-6.3.el5" test_ref="oval:org.mitre.oval:tst:34307"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10986" version="5" class="vulnerability">
      <metadata>
        <title>The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1579"/>
        <description>The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:13.366-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:42.762-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:14.707-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10986 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:34.931-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:28.592-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-13.el3" test_ref="oval:org.mitre.oval:tst:38027"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-5.el4_8.5" test_ref="oval:org.mitre.oval:tst:38669"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="squirrelmail is earlier than 0:1.4.8-5.el5_3.7" test_ref="oval:org.mitre.oval:tst:37946"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10982" version="5" class="vulnerability">
      <metadata>
        <title>GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0971"/>
        <description>GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:39.937-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:42.114-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:13.918-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10982 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:17.859-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:27.560-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="gnupg is earlier than 0:1.2.1-10" test_ref="oval:org.mitre.oval:tst:30485"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10981" version="5" class="vulnerability">
      <metadata>
        <title>The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094"/>
        <description>The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:28.271-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:41.706-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:13.509-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10981 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:43:34.841-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:26.972-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-77.ent" test_ref="oval:org.mitre.oval:tst:39637"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-77.ent" test_ref="oval:org.mitre.oval:tst:39671"/>
            <criterion comment="httpd is earlier than 0:2.0.46-77.ent" test_ref="oval:org.mitre.oval:tst:39611"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39448"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39501"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:38802"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39716"/>
            <criterion comment="httpd is earlier than 0:2.0.52-41.ent.6" test_ref="oval:org.mitre.oval:tst:39551"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-manual is earlier than 0:2.2.3-31.el5_4.2" test_ref="oval:org.mitre.oval:tst:39267"/>
            <criterion comment="httpd-devel is earlier than 0:2.2.3-31.el5_4.2" test_ref="oval:org.mitre.oval:tst:39640"/>
            <criterion comment="mod_ssl is earlier than 0:2.2.3-31.el5_4.2" test_ref="oval:org.mitre.oval:tst:39613"/>
            <criterion comment="httpd is earlier than 0:2.2.3-31.el5_4.2" test_ref="oval:org.mitre.oval:tst:39756"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10980" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka "Privilege escalation via incorrect principals."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-1235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235"/>
        <description>Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka "Privilege escalation via incorrect principals."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:20.143-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:41.175-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:12.863-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10980 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:31:00.815-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:44:45.495-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:26.261-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36547"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36570"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36574"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35661"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36605"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35672"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:35874"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36533"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36355"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.16.el3" test_ref="oval:org.mitre.oval:tst:36379"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36587"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:35752"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-10.el4" test_ref="oval:org.mitre.oval:tst:36259"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36586"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36333"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36500"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.14.el4" test_ref="oval:org.mitre.oval:tst:35884"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36540"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36602"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36557"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36511"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-15.el4" test_ref="oval:org.mitre.oval:tst:36221"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36566"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-14.el5_1" test_ref="oval:org.mitre.oval:tst:36305"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-11.el5_1" test_ref="oval:org.mitre.oval:tst:36619"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10978" version="5" class="vulnerability">
      <metadata>
        <title>netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924"/>
        <description>netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:14.566-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:40.503-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:12.156-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10978 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:48.527-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:25.271-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="netpbm is earlier than 0:9.24-11.30.1" test_ref="oval:org.mitre.oval:tst:30423"/>
          <criterion comment="netpbm-progs is earlier than 0:9.24-11.30.1" test_ref="oval:org.mitre.oval:tst:30524"/>
          <criterion comment="netpbm-devel is earlier than 0:9.24-11.30.1" test_ref="oval:org.mitre.oval:tst:29931"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10975" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the readImageData function in giftopnm.c in netpbm before 10.27 in netpbm before 10.27 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0554"/>
        <description>Buffer overflow in the readImageData function in giftopnm.c in netpbm before 10.27 in netpbm before 10.27 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:39.644-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:39.609-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:10.977-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10975 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:53:00.583-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T17:01:10.807-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:23.574-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="netpbm is earlier than 0:9.24-11.30.5" test_ref="oval:org.mitre.oval:tst:36235"/>
            <criterion comment="netpbm-progs is earlier than 0:9.24-11.30.5" test_ref="oval:org.mitre.oval:tst:36177"/>
            <criterion comment="netpbm-devel is earlier than 0:9.24-11.30.5" test_ref="oval:org.mitre.oval:tst:35689"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="netpbm is earlier than 0:10.25-2.EL4.6.el4_6.1" test_ref="oval:org.mitre.oval:tst:36288"/>
            <criterion comment="netpbm-progs is earlier than 0:10.25-2.EL4.6.el4_6.1" test_ref="oval:org.mitre.oval:tst:36136"/>
            <criterion comment="netpbm-devel is earlier than 0:10.25-2.EL4.6.el4_6.1" test_ref="oval:org.mitre.oval:tst:36139"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10972" version="5" class="vulnerability">
      <metadata>
        <title>The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307"/>
        <description>The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:30.183-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:38.512-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:09.388-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10972 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:19.353-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:21.981-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38597"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38375"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38403"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38521"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38542"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:37726"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38677"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38096"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38577"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38540"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38634"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-23.el4" test_ref="oval:org.mitre.oval:tst:38562"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38697"/>
            <criterion comment="firefox is earlier than 0:3.0.9-1.el4" test_ref="oval:org.mitre.oval:tst:38379"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38716"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38190"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38685"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38596"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38308"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38633"/>
            <criterion comment="firefox is earlier than 0:3.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38370"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.22-2.el5_3" test_ref="oval:org.mitre.oval:tst:38801"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38462"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10971" version="5" class="vulnerability">
      <metadata>
        <title>The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6151"/>
        <description>The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:00.278-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:38.072-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:08.857-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10971 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:53:00.419-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:21.408-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35915"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:35794"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36513"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36264"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36161"/>
            <criterion comment="kernel is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36518"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36597"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36612"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-57.EL" test_ref="oval:org.mitre.oval:tst:36171"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-xenU is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:36090"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35525"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35832"/>
            <criterion comment="kernel-xenU-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35126"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35901"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:36007"/>
            <criterion comment="kernel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35982"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:36072"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:36041"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35364"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-67.0.4.EL" test_ref="oval:org.mitre.oval:tst:35662"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10969" version="5" class="vulnerability">
      <metadata>
        <title>The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604"/>
        <description>The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:51.243-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:37.699-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:08.472-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10969 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:43.388-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:20.840-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xpdf is earlier than 1:2.02-17.el3" test_ref="oval:org.mitre.oval:tst:39361"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-15.el4_8.2" test_ref="oval:org.mitre.oval:tst:39438"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.7.2.el4_8.5" test_ref="oval:org.mitre.oval:tst:39221"/>
            <criterion comment="xpdf is earlier than 1:3.00-22.el4_8.1" test_ref="oval:org.mitre.oval:tst:38963"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-15.el4_8.2" test_ref="oval:org.mitre.oval:tst:39094"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.5.4-15.el5_4.2" test_ref="oval:org.mitre.oval:tst:39062"/>
            <criterion comment="poppler-utils is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38512"/>
            <criterion comment="poppler-devel is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38500"/>
            <criterion comment="kdegraphics is earlier than 7:3.5.4-15.el5_4.2" test_ref="oval:org.mitre.oval:tst:39529"/>
            <criterion comment="poppler is earlier than 0:0.5.4-4.4.el5_3.9" test_ref="oval:org.mitre.oval:tst:38760"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10968" version="5" class="vulnerability">
      <metadata>
        <title>The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023"/>
        <description>The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:14.853-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:37.278-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:08.124-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10968 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:35.970-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:20.345-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-73.ent" test_ref="oval:org.mitre.oval:tst:38833"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-73.ent" test_ref="oval:org.mitre.oval:tst:38794"/>
            <criterion comment="httpd is earlier than 0:2.0.46-73.ent" test_ref="oval:org.mitre.oval:tst:38826"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="apr-util-devel is earlier than 0:0.9.4-22.el4_8.1" test_ref="oval:org.mitre.oval:tst:38152"/>
            <criterion comment="apr-util is earlier than 0:0.9.4-22.el4_8.1" test_ref="oval:org.mitre.oval:tst:38886"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="apr-util-docs is earlier than 0:1.2.7-7.el5_3.1" test_ref="oval:org.mitre.oval:tst:38344"/>
            <criterion comment="apr-util-devel is earlier than 0:1.2.7-7.el5_3.1" test_ref="oval:org.mitre.oval:tst:38871"/>
            <criterion comment="apr-util is earlier than 0:1.2.7-7.el5_3.1" test_ref="oval:org.mitre.oval:tst:38788"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10967" version="5" class="vulnerability">
      <metadata>
        <title>Firefox 1.0 does not invoke the Javascript Security Manager when a user drags a javascript: or data: URL to a tab, which allows remote attackers to bypass the security model, aka "firetabbing."</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0232"/>
        <description>Firefox 1.0 allows remote attackers to modify Boolean configuration parameters for the about:config site by using a plugin such as Flash, and the -moz-opacity filter, to display the about:config site then cause the user to double-click at a certain screen position, aka "Fireflashing."</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:08.926-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:36.882-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:07.727-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10967 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:29.447-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:19.851-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="firefox is earlier than 0:1.0.1-1.4.3" test_ref="oval:org.mitre.oval:tst:31118"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10966" version="5" class="vulnerability">
      <metadata>
        <title>Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors, a different issue than CVE-2006-5468.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0458"/>
        <description>Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors, a different issue than CVE-2006-5468.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:13.680-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:36.582-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:07.396-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10966 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:34.229-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:19.380-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.5-EL3.1" test_ref="oval:org.mitre.oval:tst:33506"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.5-EL3.1" test_ref="oval:org.mitre.oval:tst:33535"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.5-EL4.1" test_ref="oval:org.mitre.oval:tst:33380"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.5-EL4.1" test_ref="oval:org.mitre.oval:tst:33530"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:0.99.5-1.el5" test_ref="oval:org.mitre.oval:tst:33509"/>
            <criterion comment="wireshark-gnome is earlier than 0:0.99.5-1.el5" test_ref="oval:org.mitre.oval:tst:33591"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10965" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allow remote attackers to execute arbitrary Javascript with user privileges by using the Script object to modify XPCNativeWrappers in a way that causes the script to be executed when a chrome action is performed.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5338"/>
        <description>Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allow remote attackers to execute arbitrary Javascript with user privileges by using the Script object to modify XPCNativeWrappers in a way that causes the script to be executed when a chrome action is performed.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:04.498-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:36.006-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:06.741-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10965 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:53:11.910-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:18.634-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35512"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35540"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35394"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35541"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35241"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35553"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35552"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:34924"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35155"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.5.el3" test_ref="oval:org.mitre.oval:tst:35441"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35489"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35324"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-0.5.el4" test_ref="oval:org.mitre.oval:tst:35240"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35182"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35311"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35454"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.7.el4" test_ref="oval:org.mitre.oval:tst:35398"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35351"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35482"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34790"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:35291"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-6.el4" test_ref="oval:org.mitre.oval:tst:34577"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35262"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-6.el5" test_ref="oval:org.mitre.oval:tst:35202"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-5.el5" test_ref="oval:org.mitre.oval:tst:35177"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10963" version="5" class="vulnerability">
      <metadata>
        <title>GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097"/>
        <description>GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:13.829-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:35.788-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:06.494-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10963 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:52:30.955-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:18.270-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="tar is earlier than 0:1.13.25-15.RHEL3" test_ref="oval:org.mitre.oval:tst:32733"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="tar is earlier than 0:1.14-12.RHEL4" test_ref="oval:org.mitre.oval:tst:33274"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10962" version="5" class="vulnerability">
      <metadata>
        <title>Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0942"/>
        <description>Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:16.139-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:35.584-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:06.247-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10962 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:53:07.615-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:17.950-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="httpd-devel is earlier than 0:2.0.46-44.ent" test_ref="oval:org.mitre.oval:tst:30849"/>
          <criterion comment="mod_ssl is earlier than 1:2.0.46-44.ent" test_ref="oval:org.mitre.oval:tst:30832"/>
          <criterion comment="httpd is earlier than 0:2.0.46-44.ent" test_ref="oval:org.mitre.oval:tst:30989"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10961" version="5" class="vulnerability">
      <metadata>
        <title>rfc1867.c in PHP before 5.0.2 allows local users to upload files to arbitrary locations via a PHP script with a certain MIME header that causes the "$_FILES" array to be modified.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0959"/>
        <description>rfc1867.c in PHP before 5.0.2 allows local users to upload files to arbitrary locations via a PHP script with a certain MIME header that causes the "$_FILES" array to be modified.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:54.474-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:35.331-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:05.929-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10961 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:44:00.892-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:51:42.688-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:17.608-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="php is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:31183"/>
          <criterion comment="php-pgsql is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:31119"/>
          <criterion comment="php-mysql is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:30756"/>
          <criterion comment="php-ldap is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:30361"/>
          <criterion comment="php-imap is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:31078"/>
          <criterion comment="php-odbc is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:31082"/>
          <criterion comment="php-devel is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:30937"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10956" version="5" class="vulnerability">
      <metadata>
        <title>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-3979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979"/>
        <description>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:26.791-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:33.952-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:04.474-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10956 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:41.967-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:16.130-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39610"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39451"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39678"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39628"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39624"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39524"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39588"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39651"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:38845"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.48.el3" test_ref="oval:org.mitre.oval:tst:39752"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39735"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39656"/>
            <criterion comment="firefox is earlier than 0:3.0.16-4.el4" test_ref="oval:org.mitre.oval:tst:39002"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39832"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39283"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39176"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-51.el4_8" test_ref="oval:org.mitre.oval:tst:39646"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.16-2.el5_4" test_ref="oval:org.mitre.oval:tst:39838"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.16-2.el5_4" test_ref="oval:org.mitre.oval:tst:39032"/>
            <criterion comment="firefox is earlier than 0:3.0.16-1.el5_4" test_ref="oval:org.mitre.oval:tst:39721"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.16-2.el5_4" test_ref="oval:org.mitre.oval:tst:39558"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10955" version="5" class="vulnerability">
      <metadata>
        <title>wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application abort) via a malformed Tamos CommView capture file (aka .ncf file) with an "unknown/unexpected packet type" that triggers a failed assertion.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682"/>
        <description>wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application abort) via a malformed Tamos CommView capture file (aka .ncf file) with an "unknown/unexpected packet type" that triggers a failed assertion.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:34:03.300-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:33.662-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:04.133-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10955 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:45.683-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:15.630-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38023"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-EL3.3" test_ref="oval:org.mitre.oval:tst:38321"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38000"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el4_7" test_ref="oval:org.mitre.oval:tst:38041"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="wireshark is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38236"/>
            <criterion comment="wireshark-gnome is earlier than 0:1.0.6-2.el5_3" test_ref="oval:org.mitre.oval:tst:38085"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10954" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.1 and Mozilla Suite before 1.7.6 use a predictable filename for the plugin temporary directory, which allows local users to delete arbitrary files of other users via a symlink attack on the plugtmp directory.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0578"/>
        <description>Firefox before 1.0.1 and Mozilla Suite before 1.7.6 use a predictable filename for the plugin temporary directory, which allows local users to delete arbitrary files of other users via a symlink attack on the plugtmp directory.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:11.250-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:33.337-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:03.713-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10954 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:49.617-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:15.071-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31283"/>
            <criterion comment="mozilla is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31520"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31645"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31516"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31569"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31143"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31512"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31785"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31695"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.7-1.1.3.4" test_ref="oval:org.mitre.oval:tst:31626"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="firefox is earlier than 0:1.0.1-1.4.3" test_ref="oval:org.mitre.oval:tst:31118"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10952" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0904"/>
        <description>Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:45.970-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:32.780-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:03.155-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10952 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:03.390-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:14.341-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30915"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30964"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30905"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30635"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:31000"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30111"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30762"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:31048"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30856"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.4" test_ref="oval:org.mitre.oval:tst:30834"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10951" version="5" class="vulnerability">
      <metadata>
        <title>CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718"/>
        <description>CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:05.133-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:31.720-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:02.357-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10951 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:52.717-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:13.378-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33776"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33817"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33769"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33528"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33915"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33822"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-40.ent" test_ref="oval:org.mitre.oval:tst:33351"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:34016"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33395"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33957"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33405"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33642"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33024"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33690"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33995"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33892"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33945"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33711"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33857"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33644"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.4" test_ref="oval:org.mitre.oval:tst:33920"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33809"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33997"/>
            <criterion comment="php-common is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33290"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33828"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33441"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:34008"/>
            <criterion comment="php is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33959"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33560"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33722"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33941"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33880"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33878"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33960"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33923"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33551"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33939"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33626"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:33770"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-11.el5" test_ref="oval:org.mitre.oval:tst:34005"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10950" version="5" class="vulnerability">
      <metadata>
        <title>fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-2711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2711"/>
        <description>fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, allows remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed mail message with long headers, which triggers an erroneous dereference when using vsnprintf to format log messages.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:14.492-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:31.462-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:02.071-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10950 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:12.108-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:12.890-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.2.0-3.el3.5" test_ref="oval:org.mitre.oval:tst:38901"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.2.5-6.0.1.el4_8.1" test_ref="oval:org.mitre.oval:tst:39046"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="fetchmail is earlier than 0:6.3.6-1.1.el5_3.1" test_ref="oval:org.mitre.oval:tst:39380"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10949" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an "integer overflow/underflow" in the pack function, or (3) an "integer overflow/underflow" in the unpack function.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1018"/>
        <description>Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an "integer overflow/underflow" in the pack function, or (3) an "integer overflow/underflow" in the unpack function.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:38.197-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:30.877-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:01.536-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10949 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:02.396-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:12.307-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:31183"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:31119"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:30756"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:30361"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:31078"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:31082"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-19.ent" test_ref="oval:org.mitre.oval:tst:30937"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31248"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31271"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31235"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31279"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31087"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31260"/>
            <criterion comment="php is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:30709"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31196"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:30324"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31008"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31291"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31210"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:31168"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.2" test_ref="oval:org.mitre.oval:tst:30329"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10947" version="5" class="vulnerability">
      <metadata>
        <title>Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2261"/>
        <description>Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:56.921-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:29.851-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:07:00.221-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10947 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:07.345-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:10.920-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32142"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32131"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32154"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32001"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32171"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32162"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31782"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32041"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32004"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31353"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32120"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31633"/>
            <criterion comment="mozilla is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31837"/>
            <criterion comment="thunderbird is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32113"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32100"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31821"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31904"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.6" test_ref="oval:org.mitre.oval:tst:31814"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31951"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31554"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32149"/>
            <criterion comment="firefox is earlier than 0:1.0.6-1.4.1" test_ref="oval:org.mitre.oval:tst:32167"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:31998"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.10-1.4.1" test_ref="oval:org.mitre.oval:tst:32061"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10943" version="5" class="vulnerability">
      <metadata>
        <title>The session restore feature in Mozilla Firefox 3.x before 3.0.4 and 2.x before 2.0.0.18 allows remote attackers to violate the same origin policy to conduct cross-site scripting (XSS) attacks and execute arbitrary JavaScript with chrome privileges via unknown vectors.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-5019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5019"/>
        <description>The session restore feature in Mozilla Firefox 3.x before 3.0.4 and 2.x before 2.0.0.18 allows remote attackers to violate the same origin policy to conduct cross-site scripting (XSS) attacks and execute arbitrary JavaScript with chrome privileges via unknown vectors.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:49.876-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:28.579-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:58.735-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10943 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:33.118-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:09.124-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37159"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37875"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37293"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37934"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37671"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37932"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37970"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37357"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37852"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.25.el3" test_ref="oval:org.mitre.oval:tst:37844"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37232"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:38065"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37914"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el4" test_ref="oval:org.mitre.oval:tst:37904"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el4" test_ref="oval:org.mitre.oval:tst:37840"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37991"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37955"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:37777"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-28.el4" test_ref="oval:org.mitre.oval:tst:38009"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37773"/>
            <criterion comment="nss-pkcs11-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37531"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37899"/>
            <criterion comment="nss is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37454"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:38021"/>
            <criterion comment="yelp is earlier than 0:2.16.0-22.el5" test_ref="oval:org.mitre.oval:tst:37645"/>
            <criterion comment="devhelp is earlier than 0:0.12-20.el5" test_ref="oval:org.mitre.oval:tst:37958"/>
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37388"/>
            <criterion comment="firefox is earlier than 0:3.0.4-1.el5" test_ref="oval:org.mitre.oval:tst:37066"/>
            <criterion comment="nss-devel is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37648"/>
            <criterion comment="nss-tools is earlier than 0:3.12.1.1-3.el5" test_ref="oval:org.mitre.oval:tst:37936"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10939" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311"/>
        <description>Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:34.361-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:26.630-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:56.995-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10939 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:13.289-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:06.928-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38597"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38375"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38403"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38521"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38542"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:37726"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38677"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38096"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38577"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.37.el3" test_ref="oval:org.mitre.oval:tst:38540"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.0.9-1.el4" test_ref="oval:org.mitre.oval:tst:38379"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38716"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38634"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38190"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38596"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38685"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-41.el4" test_ref="oval:org.mitre.oval:tst:38697"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38308"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38633"/>
            <criterion comment="firefox is earlier than 0:3.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38370"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.9-1.el5" test_ref="oval:org.mitre.oval:tst:38462"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10938" version="5" class="vulnerability">
      <metadata>
        <title>Multiple integer overflows in the (1) png_read_png in pngread.c or (2) png_handle_sPLT functions in pngrutil.c or (3) progressive display image reading capability in libpng 1.2.5 and earlier allow remote attackers to cause a denial of service (application crash) via a malformed PNG image.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0599"/>
        <description>Multiple integer overflows in the (1) png_read_png in pngread.c or (2) png_handle_sPLT functions in pngrutil.c or (3) progressive display image reading capability in libpng 1.2.5 and earlier allow remote attackers to cause a denial of service (application crash) via a malformed PNG image.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:52.112-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:26.282-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:56.621-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10938 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:49.555-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:06.497-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="mozilla-js-debugger is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30799"/>
          <criterion comment="libpng10-devel is earlier than 0:1.0.13-15" test_ref="oval:org.mitre.oval:tst:29821"/>
          <criterion comment="mozilla is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30278"/>
          <criterion comment="mozilla-chat is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30755"/>
          <criterion comment="libpng-devel is earlier than 2:1.2.2-25" test_ref="oval:org.mitre.oval:tst:30405"/>
          <criterion comment="mozilla-mail is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30570"/>
          <criterion comment="libpng10 is earlier than 0:1.0.13-15" test_ref="oval:org.mitre.oval:tst:30512"/>
          <criterion comment="mozilla-dom-inspector is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30230"/>
          <criterion comment="mozilla-nss is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30323"/>
          <criterion comment="mozilla-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30288"/>
          <criterion comment="mozilla-nss-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30339"/>
          <criterion comment="mozilla-nspr is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30813"/>
          <criterion comment="mozilla-nspr-devel is earlier than 37:1.4.3-3.0.2" test_ref="oval:org.mitre.oval:tst:30660"/>
          <criterion comment="libpng is earlier than 2:1.2.2-25" test_ref="oval:org.mitre.oval:tst:30788"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10936" version="5" class="vulnerability">
      <metadata>
        <title>The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930"/>
        <description>The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:14.689-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:25.594-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:55.925-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10936 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:37.429-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:05.595-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="samba-common is earlier than 0:3.0.7-1.3E.1" test_ref="oval:org.mitre.oval:tst:30820"/>
          <criterion comment="samba-swat is earlier than 0:3.0.7-1.3E.1" test_ref="oval:org.mitre.oval:tst:31128"/>
          <criterion comment="samba-client is earlier than 0:3.0.7-1.3E.1" test_ref="oval:org.mitre.oval:tst:31144"/>
          <criterion comment="samba is earlier than 0:3.0.7-1.3E.1" test_ref="oval:org.mitre.oval:tst:31136"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10931" version="5" class="vulnerability">
      <metadata>
        <title>The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0918"/>
        <description>The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:06.208-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:24.316-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:54.482-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10931 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:18:00.333-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:03.491-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="squid is earlier than 7:2.5.STABLE3-6.3E.2" test_ref="oval:org.mitre.oval:tst:31037"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10930" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using an eval in an XBL method binding (XBL.method.eval) to create Javascript functions that are compiled with extra privileges.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735"/>
        <description>Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using an eval in an XBL method binding (XBL.method.eval) to create Javascript functions that are compiled with extra privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:05.105-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:23.798-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:53.909-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10930 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:47.485-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:02.823-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="thunderbird is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32204"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10929" version="5" class="vulnerability">
      <metadata>
        <title>Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset.  NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465"/>
        <description>Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset.  NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:30:21.678-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:23.434-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:53.527-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10929 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:52.676-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:02.246-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-devel is earlier than 0:2.0.46-70.ent" test_ref="oval:org.mitre.oval:tst:35773"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.46-70.ent" test_ref="oval:org.mitre.oval:tst:36016"/>
            <criterion comment="httpd is earlier than 0:2.0.46-70.ent" test_ref="oval:org.mitre.oval:tst:35281"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-suexec is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35606"/>
            <criterion comment="httpd-manual is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35973"/>
            <criterion comment="httpd-devel is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35916"/>
            <criterion comment="mod_ssl is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35852"/>
            <criterion comment="httpd is earlier than 0:2.0.52-38.ent.2" test_ref="oval:org.mitre.oval:tst:35768"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="httpd-manual is earlier than 0:2.2.3-11.el5_1.3" test_ref="oval:org.mitre.oval:tst:35953"/>
            <criterion comment="httpd-devel is earlier than 0:2.2.3-11.el5_1.3" test_ref="oval:org.mitre.oval:tst:35668"/>
            <criterion comment="mod_ssl is earlier than 0:2.2.3-11.el5_1.3" test_ref="oval:org.mitre.oval:tst:35991"/>
            <criterion comment="httpd is earlier than 0:2.2.3-11.el5_1.3" test_ref="oval:org.mitre.oval:tst:35696"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10927" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the readline function in util/texindex.c, as used by the (1) texi2dvi and (2) texindex commands, in texinfo 4.8 and earlier allows local users to execute arbitrary code via a crafted Texinfo file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0244"/>
        <description>PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:23.339-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:22.723-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:52.759-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10927 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:39.928-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:10:01.250-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="rh-postgresql-devel is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:30936"/>
            <criterion comment="rh-postgresql-server is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:30803"/>
            <criterion comment="rh-postgresql-python is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31436"/>
            <criterion comment="rh-postgresql-libs is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31064"/>
            <criterion comment="rh-postgresql-docs is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:30591"/>
            <criterion comment="rh-postgresql-test is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31342"/>
            <criterion comment="rh-postgresql-pl is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31217"/>
            <criterion comment="rh-postgresql-tcl is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31199"/>
            <criterion comment="rh-postgresql is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31415"/>
            <criterion comment="rh-postgresql-contrib is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31005"/>
            <criterion comment="rh-postgresql-jdbc is earlier than 0:7.3.9-2" test_ref="oval:org.mitre.oval:tst:31233"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="postgresql is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31336"/>
            <criterion comment="postgresql-docs is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31398"/>
            <criterion comment="postgresql-pl is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31229"/>
            <criterion comment="postgresql-tcl is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:30946"/>
            <criterion comment="postgresql-libs is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31215"/>
            <criterion comment="postgresql-contrib is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:30784"/>
            <criterion comment="postgresql-python is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31126"/>
            <criterion comment="postgresql-test is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31318"/>
            <criterion comment="postgresql-jdbc is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31273"/>
            <criterion comment="postgresql-server is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31424"/>
            <criterion comment="postgresql-devel is earlier than 0:7.4.7-2.RHEL4.1" test_ref="oval:org.mitre.oval:tst:31325"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10922" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to read arbitrary files by (1) inserting the target filename into a text box, then turning that box into a file upload control, or (2) changing the type of the input control that is associated with an event handler.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-1729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729"/>
        <description>Mozilla Firefox 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to read arbitrary files by (1) inserting the target filename into a text box, then turning that box into a file upload control, or (2) changing the type of the input control that is associated with an event handler.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:33:47.868-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:20.801-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:51.168-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10922 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:10:00.062-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:17:33.356-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:58.963-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="           The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32663"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32326"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:31987"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32451"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32697"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32558"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32427"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32671"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32666"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.1.3.1" test_ref="oval:org.mitre.oval:tst:32561"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="mozilla-js-debugger is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32593"/>
            <criterion comment="devhelp-devel is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32679"/>
            <criterion comment="mozilla is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32133"/>
            <criterion comment="mozilla-chat is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32701"/>
            <criterion comment="mozilla-mail is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32428"/>
            <criterion comment="mozilla-dom-inspector is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32557"/>
            <criterion comment="devhelp is earlier than 0:0.9.2-2.4.8" test_ref="oval:org.mitre.oval:tst:32229"/>
            <criterion comment="mozilla-nss is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32349"/>
            <criterion comment="mozilla-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32644"/>
            <criterion comment="mozilla-nss-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32440"/>
            <criterion comment="firefox is earlier than 0:1.0.8-1.4.1" test_ref="oval:org.mitre.oval:tst:32219"/>
            <criterion comment="mozilla-nspr is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32598"/>
            <criterion comment="mozilla-nspr-devel is earlier than 37:1.7.13-1.4.1" test_ref="oval:org.mitre.oval:tst:32717"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10921" version="5" class="vulnerability">
      <metadata>
        <title>umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-2876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2876"/>
        <description>umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:15.191-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:20.556-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:50.715-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10921 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:53.988-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:58.563-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="util-linux is earlier than 0:2.11y-31.11" test_ref="oval:org.mitre.oval:tst:32222"/>
            <criterion comment="mount is earlier than 0:2.11y-31.11" test_ref="oval:org.mitre.oval:tst:31332"/>
            <criterion comment="losetup is earlier than 0:2.11y-31.11" test_ref="oval:org.mitre.oval:tst:32224"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="util-linux is earlier than 0:2.12a-16.EL4.12" test_ref="oval:org.mitre.oval:tst:31892"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10918" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in Linux before 2.4.26 for IA64 allows local users to cause a denial of service, with unknown impact.  NOTE: due to a typo, this issue was accidentally assigned CVE-2004-0477.  This is the proper candidate to use for the Linux local DoS.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0447"/>
        <description>Unknown vulnerability in Linux before 2.4.26 for IA64 allows local users to cause a denial of service, with unknown impact.  NOTE: due to a typo, this issue was accidentally assigned CVE-2004-0477.  This is the proper candidate to use for the Linux local DoS.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:53.353-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:19.803-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:49.941-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10918 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:38.987-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:58.197-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30827"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30622"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30627"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30676"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30823"/>
          <criterion comment="kernel is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30750"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30596"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30833"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-15.0.4.EL" test_ref="oval:org.mitre.oval:tst:30830"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10917" version="5" class="vulnerability">
      <metadata>
        <title>rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0967"/>
        <description>rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:46.673-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:19.621-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:49.736-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10917 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:44.374-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:57.832-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="freeradius is earlier than 0:0.9.3-1" test_ref="oval:org.mitre.oval:tst:30495"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10916" version="5" class="vulnerability">
      <metadata>
        <title>TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving "unchecked arithmetic operations".</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-3464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464"/>
        <description>TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving "unchecked arithmetic operations".</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:06.148-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:19.358-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:49.447-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10916 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:30.481-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:57.426-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kdegraphics-devel is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:32819"/>
            <criterion comment="libtiff is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32069"/>
            <criterion comment="kdegraphics is earlier than 7:3.1.3-3.10" test_ref="oval:org.mitre.oval:tst:33012"/>
            <criterion comment="libtiff-devel is earlier than 0:3.5.7-25.el3.4" test_ref="oval:org.mitre.oval:tst:32843"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="libtiff is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32922"/>
            <criterion comment="libtiff-devel is earlier than 0:3.6.1-12" test_ref="oval:org.mitre.oval:tst:32413"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10915" version="5" class="vulnerability">
      <metadata>
        <title>The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-6239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239"/>
        <description>The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:22.565-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:19.107-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:49.165-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10915 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:25.301-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:56.913-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE3-8.3E" test_ref="oval:org.mitre.oval:tst:35706"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.5.STABLE14-1.4E.el4_6.1" test_ref="oval:org.mitre.oval:tst:35925"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criterion comment="squid is earlier than 7:2.6.STABLE6-5.el5_1.2" test_ref="oval:org.mitre.oval:tst:35839"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10914" version="5" class="vulnerability">
      <metadata>
        <title>Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, and (4) pdftohtml, (5) KOffice KWord, (6) CUPS, and (7) libextractor allows remote attackers to execute arbitrary code via a PDF file with an out-of-range numComps (number of components) field.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-3192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192"/>
        <description>Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, and (4) pdftohtml, (5) KOffice KWord, (6) CUPS, and (7) libextractor allows remote attackers to execute arbitrary code via a PDF file with an out-of-range numComps (number of components) field.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:25.487-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:18.554-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:48.567-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10914 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:55.052-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:56.293-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32436"/>
            <criterion comment="tetex-dvips is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32311"/>
            <criterion comment="tetex-fonts is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32279"/>
            <criterion comment="cups-libs is earlier than 1:1.1.17-13.3.34" test_ref="oval:org.mitre.oval:tst:32490"/>
            <criterion comment="tetex is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32507"/>
            <criterion comment="cups-devel is earlier than 1:1.1.17-13.3.34" test_ref="oval:org.mitre.oval:tst:32463"/>
            <criterion comment="tetex-afm is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:32377"/>
            <criterion comment="xpdf is earlier than 1:2.02-9.8" test_ref="oval:org.mitre.oval:tst:31474"/>
            <criterion comment="tetex-xdvi is earlier than 0:1.0.7-67.9" test_ref="oval:org.mitre.oval:tst:31613"/>
            <criterion comment="cups is earlier than 1:1.1.17-13.3.34" test_ref="oval:org.mitre.oval:tst:31538"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="tetex-latex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32260"/>
            <criterion comment="kdegraphics-devel is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:32395"/>
            <criterion comment="tetex-dvips is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32095"/>
            <criterion comment="kdegraphics is earlier than 7:3.3.1-3.6" test_ref="oval:org.mitre.oval:tst:31805"/>
            <criterion comment="tetex-fonts is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32489"/>
            <criterion comment="cups-libs is earlier than 1:1.1.22-0.rc1.9.9" test_ref="oval:org.mitre.oval:tst:31551"/>
            <criterion comment="tetex is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32199"/>
            <criterion comment="gpdf is earlier than 0:2.8.2-7.3" test_ref="oval:org.mitre.oval:tst:32230"/>
            <criterion comment="cups-devel is earlier than 1:1.1.22-0.rc1.9.9" test_ref="oval:org.mitre.oval:tst:32368"/>
            <criterion comment="tetex-afm is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32308"/>
            <criterion comment="xpdf is earlier than 1:3.00-11.10" test_ref="oval:org.mitre.oval:tst:32152"/>
            <criterion comment="tetex-xdvi is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32333"/>
            <criterion comment="tetex-doc is earlier than 0:2.0.2-22.EL4.7" test_ref="oval:org.mitre.oval:tst:32317"/>
            <criterion comment="cups is earlier than 1:1.1.22-0.rc1.9.9" test_ref="oval:org.mitre.oval:tst:32431"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10913" version="5" class="vulnerability">
      <metadata>
        <title>Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0179"/>
        <description>Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:35:04.912-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:18.335-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:48.331-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10913 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:18.848-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:55.922-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="openoffice.org-libs is earlier than 0:1.1.0-15.EL" test_ref="oval:org.mitre.oval:tst:30342"/>
          <criterion comment="openoffice.org is earlier than 0:1.1.0-15.EL" test_ref="oval:org.mitre.oval:tst:30671"/>
          <criterion comment="openoffice.org-i18n is earlier than 0:1.1.0-15.EL" test_ref="oval:org.mitre.oval:tst:29960"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10912" version="5" class="vulnerability">
      <metadata>
        <title>iproute 2.4.7 and earlier allows local users to cause a denial of service via spoofed messages as other users to the kernel netlink interface.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2003-0856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0856"/>
        <description>iproute 2.4.7 and earlier allows local users to cause a denial of service via spoofed messages as other users to the kernel netlink interface.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:30.865-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:18.149-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:48.122-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10912 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:35.935-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:55.660-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="iproute is earlier than 0:2.4.7-11.30E.1" test_ref="oval:org.mitre.oval:tst:29928"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10910" version="5" class="vulnerability">
      <metadata>
        <title>Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain privileges.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0001"/>
        <description>Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain privileges.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:34.313-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:17.592-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:47.509-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10910 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:47.431-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:54.668-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30492"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30319"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30091"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30430"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30603"/>
          <criterion comment="kernel is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30486"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30341"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30477"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-9.EL" test_ref="oval:org.mitre.oval:tst:30442"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10909" version="5" class="vulnerability">
      <metadata>
        <title>The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-1263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1263"/>
        <description>The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:33.647-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:17.291-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:47.208-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10909 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:00.561-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:54.297-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="kernel-BOOT is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31870"/>
          <criterion comment="kernel-unsupported is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31657"/>
          <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31642"/>
          <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31984"/>
          <criterion comment="kernel-hugemem is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31213"/>
          <criterion comment="kernel is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31839"/>
          <criterion comment="kernel-source is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31941"/>
          <criterion comment="kernel-doc is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31760"/>
          <criterion comment="kernel-smp is earlier than 0:2.4.21-32.0.1.EL" test_ref="oval:org.mitre.oval:tst:31960"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10907" version="5" class="vulnerability">
      <metadata>
        <title>Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0785"/>
        <description>Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:39.925-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:16.124-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:46.089-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10907 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:49.272-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:53.975-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="gaim is earlier than 1:0.82.1-0.RHEL3" test_ref="oval:org.mitre.oval:tst:30434"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10906" version="5" class="vulnerability">
      <metadata>
        <title>The browser engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) the frame chain and synchronous events, (2) a SetMayHaveFrame assertion and nsCSSFrameConstructor::CreateFloatingLetterFrame, (3) nsCSSFrameConstructor::ConstructFrame, (4) the child list and initial reflow, (5) GetLastSpecialSibling, (6) nsFrameManager::GetPrimaryFrameFor and MathML, (7) nsFrame::GetBoxAscent, (8) nsCSSFrameConstructor::AdjustParentFrame, (9) nsDOMOfflineResourceList, and (10) nsContentUtils::ComparePosition.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-2462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2462"/>
        <description>The browser engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) the frame chain and synchronous events, (2) a SetMayHaveFrame assertion and nsCSSFrameConstructor::CreateFloatingLetterFrame, (3) nsCSSFrameConstructor::ConstructFrame, (4) the child list and initial reflow, (5) GetLastSpecialSibling, (6) nsFrameManager::GetPrimaryFrameFor and MathML, (7) nsFrame::GetBoxAscent, (8) nsCSSFrameConstructor::AdjustParentFrame, (9) nsDOMOfflineResourceList, and (10) nsContentUtils::ComparePosition.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:22.114-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:15.517-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:45.488-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10906 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:07.877-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:53.289-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38881"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38851"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38690"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38366"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38475"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38924"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38923"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38918"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38811"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.40.el3" test_ref="oval:org.mitre.oval:tst:38644"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38772"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-25.el4" test_ref="oval:org.mitre.oval:tst:40299"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:37948"/>
            <criterion comment="firefox is earlier than 0:3.0.12-1.el4" test_ref="oval:org.mitre.oval:tst:38809"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38947"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38194"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38876"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-45.el4_8" test_ref="oval:org.mitre.oval:tst:38504"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xulrunner-devel-unstable is earlier than 0:1.9.0.12-1.el5_3" test_ref="oval:org.mitre.oval:tst:38249"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.0.12-1.el5_3" test_ref="oval:org.mitre.oval:tst:38575"/>
            <criterion comment="firefox is earlier than 0:3.0.12-1.el5_3" test_ref="oval:org.mitre.oval:tst:38853"/>
            <criterion comment="thunderbird is earlier than 0:2.0.0.24-2.el5_4" test_ref="oval:org.mitre.oval:tst:40249"/>
            <criterion comment="xulrunner is earlier than 0:1.9.0.12-1.el5_3" test_ref="oval:org.mitre.oval:tst:38563"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10904" version="5" class="vulnerability">
      <metadata>
        <title>Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-5135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135"/>
        <description>Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:26.761-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:14.825-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:44.770-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10904 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:24:18.133-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:52.329-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-33.24" test_ref="oval:org.mitre.oval:tst:35001"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-33.24" test_ref="oval:org.mitre.oval:tst:34962"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-33.24" test_ref="oval:org.mitre.oval:tst:34324"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.7a-43.17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35545"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.7a-43.17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35457"/>
            <criterion comment="openssl is earlier than 0:0.9.7a-43.17.el4_6.1" test_ref="oval:org.mitre.oval:tst:35580"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openssl-perl is earlier than 0:0.9.8b-8.3.el5_0.2" test_ref="oval:org.mitre.oval:tst:35181"/>
            <criterion comment="openssl-devel is earlier than 0:0.9.8b-8.3.el5_0.2" test_ref="oval:org.mitre.oval:tst:35460"/>
            <criterion comment="openssl is earlier than 0:0.9.8b-8.3.el5_0.2" test_ref="oval:org.mitre.oval:tst:35053"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10902" version="5" class="vulnerability">
      <metadata>
        <title>Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0953"/>
        <description>Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:49.646-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:14.176-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:44.151-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10902 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:45.936-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:51.473-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bzip2-devel is earlier than 0:1.0.2-11.EL3.4" test_ref="oval:org.mitre.oval:tst:31970"/>
            <criterion comment="bzip2 is earlier than 0:1.0.2-11.EL3.4" test_ref="oval:org.mitre.oval:tst:31944"/>
            <criterion comment="bzip2-libs is earlier than 0:1.0.2-11.EL3.4" test_ref="oval:org.mitre.oval:tst:31594"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="bzip2-devel is earlier than 0:1.0.2-13.EL4.3" test_ref="oval:org.mitre.oval:tst:31440"/>
            <criterion comment="bzip2 is earlier than 0:1.0.2-13.EL4.3" test_ref="oval:org.mitre.oval:tst:31845"/>
            <criterion comment="bzip2-libs is earlier than 0:1.0.2-13.EL4.3" test_ref="oval:org.mitre.oval:tst:30992"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10900" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox before 2.0.0.12 and Thunderbird before 2.0.0.12 does not properly manage a delay timer used in confirmation dialogs, which might allow remote attackers to trick users into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2".</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591"/>
        <description>Mozilla Firefox before 2.0.0.12 and Thunderbird before 2.0.0.12 does not properly manage a delay timer used in confirmation dialogs, which might allow remote attackers to trick users into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2".</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:43.423-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:13.419-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:43.320-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10900 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T16:19:00.859-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T16:23:41.624-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:50.420-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36256"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36236"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35996"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36279"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36046"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36052"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36034"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:36284"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35748"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.9.el3" test_ref="oval:org.mitre.oval:tst:35994"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36164"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36050"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-8.el4" test_ref="oval:org.mitre.oval:tst:36202"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36193"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36093"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36053"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-0.10.el4" test_ref="oval:org.mitre.oval:tst:35919"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35600"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36141"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35397"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:35684"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-9.el4" test_ref="oval:org.mitre.oval:tst:36203"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox-devel is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:36281"/>
            <criterion comment="firefox is earlier than 0:1.5.0.12-9.el5" test_ref="oval:org.mitre.oval:tst:35480"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.12-8.el5" test_ref="oval:org.mitre.oval:tst:35675"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10899" version="5" class="vulnerability">
      <metadata>
        <title>statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote attackers to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-1014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1014"/>
        <description>statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote attackers to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:20.177-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:13.232-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:43.111-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10899 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:46.687-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:50.150-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criterion comment="nfs-utils is earlier than 0:1.0.6-33EL" test_ref="oval:org.mitre.oval:tst:31063"/>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10898" version="5" class="vulnerability">
      <metadata>
        <title>xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2005-0638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0638"/>
        <description>xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:33.972-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:12.982-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:42.829-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10898 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:53.933-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:49.721-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="xloadimage is earlier than 0:4.1-34.RHEL3" test_ref="oval:org.mitre.oval:tst:31232"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="xloadimage is earlier than 0:4.1-34.RHEL4" test_ref="oval:org.mitre.oval:tst:31621"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10897" version="5" class="vulnerability">
      <metadata>
        <title>PHP before 5.2.3 allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the pattern parameter to the glob function; or (2) a long string in the string parameter to the fnmatch function, accompanied by a pattern parameter value with undefined characteristics, as demonstrated by a "*[1]e" value.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782"/>
        <description>PHP before 5.2.3 allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the pattern parameter to the glob function; or (2) a long string in the string parameter to the fnmatch function, accompanied by a pattern parameter value with undefined characteristics, as demonstrated by a "*[1]e" value.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:32.540-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:12.284-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:42.008-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10897 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:09.565-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:48.786-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:37185"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:36983"/>
            <criterion comment="php-mysql is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:36761"/>
            <criterion comment="php-ldap is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:37254"/>
            <criterion comment="php-imap is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:37280"/>
            <criterion comment="php-odbc is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:36584"/>
            <criterion comment="php-devel is earlier than 0:4.3.2-48.ent" test_ref="oval:org.mitre.oval:tst:37255"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-xmlrpc is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37302"/>
            <criterion comment="php-snmp is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37269"/>
            <criterion comment="php-domxml is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:36771"/>
            <criterion comment="php-mysql is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:36854"/>
            <criterion comment="php-imap is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37155"/>
            <criterion comment="php-gd is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37143"/>
            <criterion comment="php is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:36781"/>
            <criterion comment="php-mbstring is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37125"/>
            <criterion comment="php-pgsql is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37202"/>
            <criterion comment="php-pear is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37223"/>
            <criterion comment="php-ldap is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37010"/>
            <criterion comment="php-odbc is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37319"/>
            <criterion comment="php-ncurses is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37113"/>
            <criterion comment="php-devel is earlier than 0:4.3.9-3.22.12" test_ref="oval:org.mitre.oval:tst:37239"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="php-bcmath is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:36927"/>
            <criterion comment="php-soap is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37138"/>
            <criterion comment="php-common is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37146"/>
            <criterion comment="php-mysql is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37179"/>
            <criterion comment="php-imap is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37204"/>
            <criterion comment="php-gd is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:36955"/>
            <criterion comment="php is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37260"/>
            <criterion comment="php-mbstring is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37282"/>
            <criterion comment="php-pgsql is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:36878"/>
            <criterion comment="php-xml is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37114"/>
            <criterion comment="php-ldap is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:36634"/>
            <criterion comment="php-odbc is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37118"/>
            <criterion comment="php-ncurses is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37283"/>
            <criterion comment="php-devel is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37127"/>
            <criterion comment="php-xmlrpc is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37086"/>
            <criterion comment="php-snmp is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37328"/>
            <criterion comment="php-pdo is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37036"/>
            <criterion comment="php-dba is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37144"/>
            <criterion comment="php-cli is earlier than 0:5.1.6-20.el5_2.1" test_ref="oval:org.mitre.oval:tst:37165"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10896" version="5" class="vulnerability">
      <metadata>
        <title>The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0594"/>
        <description>The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:26:39.457-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:11.971-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:41.725-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10896 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:00.555-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:47.707-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="php is earlier than 0:4.3.2-11.1.ent" test_ref="oval:org.mitre.oval:tst:30741"/>
          <criterion comment="php-pgsql is earlier than 0:4.3.2-11.1.ent" test_ref="oval:org.mitre.oval:tst:30765"/>
          <criterion comment="php-mysql is earlier than 0:4.3.2-11.1.ent" test_ref="oval:org.mitre.oval:tst:30773"/>
          <criterion comment="php-ldap is earlier than 0:4.3.2-11.1.ent" test_ref="oval:org.mitre.oval:tst:30554"/>
          <criterion comment="php-imap is earlier than 0:4.3.2-11.1.ent" test_ref="oval:org.mitre.oval:tst:30707"/>
          <criterion comment="php-odbc is earlier than 0:4.3.2-11.1.ent" test_ref="oval:org.mitre.oval:tst:30729"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10895" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to bypass cross-site scripting (XSS) protection by changing the src attribute of an IMG element to a javascript: URI.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-6503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503"/>
        <description>Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to bypass cross-site scripting (XSS) protection by changing the src attribute of an IMG element to a javascript: URI.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:55.906-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:11.492-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:41.185-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10895 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:24.778-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:46.874-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32785"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33227"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33266"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33146"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32352"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33183"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33095"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33300"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:32996"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el3" test_ref="oval:org.mitre.oval:tst:33263"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33195"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33236"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33229"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32844"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33273"/>
            <criterion comment="seamonkey is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33259"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33239"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.6.el4" test_ref="oval:org.mitre.oval:tst:33284"/>
            <criterion comment="firefox is earlier than 0:1.5.0.9-0.1.el4" test_ref="oval:org.mitre.oval:tst:32815"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33153"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33015"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33251"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:33336"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32408"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10894" version="5" class="vulnerability">
      <metadata>
        <title>Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute arbitrary Ex commands by entering an argument after a (2) "Ctrl-]" (control close-square-bracket) or (3) "g]" (g close-square-bracket) keystroke sequence, a different issue than CVE-2008-2712.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2008-4101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4101"/>
        <description>Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute arbitrary Ex commands by entering an argument after a (2) "Ctrl-]" (control close-square-bracket) or (3) "g]" (g close-square-bracket) keystroke sequence, a different issue than CVE-2008-2712.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:29:39.450-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:11.075-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:40.527-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10894 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:09.763-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:46.276-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37217"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37049"/>
            <criterion comment="vim is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37429"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37390"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-0.30E.11" test_ref="oval:org.mitre.oval:tst:37492"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37521"/>
            <criterion comment="vim-enhanced is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37326"/>
            <criterion comment="vim is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:36926"/>
            <criterion comment="vim-X11 is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37520"/>
            <criterion comment="vim-common is earlier than 1:6.3.046-1.el4_7.5z" test_ref="oval:org.mitre.oval:tst:37284"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="vim-minimal is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37412"/>
            <criterion comment="vim-enhanced is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37218"/>
            <criterion comment="vim is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37405"/>
            <criterion comment="vim-X11 is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37384"/>
            <criterion comment="vim-common is earlier than 2:7.0.109-4.el5_2.4z" test_ref="oval:org.mitre.oval:tst:37365"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10893" version="5" class="vulnerability">
      <metadata>
        <title>Buffer overflow in the readline function in util/texindex.c, as used by the (1) texi2dvi and (2) texindex commands, in texinfo 4.8 and earlier allows local users to execute arbitrary code via a crafted Texinfo file.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810"/>
        <description>Buffer overflow in the readline function in util/texindex.c, as used by the (1) texi2dvi and (2) texindex commands, in texinfo 4.8 and earlier allows local users to execute arbitrary code via a crafted Texinfo file.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:55.815-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:10.776-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:40.258-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10893 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:04.788-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:45.798-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="info is earlier than 0:4.5-3.el3.1" test_ref="oval:org.mitre.oval:tst:33067"/>
            <criterion comment="texinfo is earlier than 0:4.5-3.el3.1" test_ref="oval:org.mitre.oval:tst:33143"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="info is earlier than 0:4.7-5.el4.2" test_ref="oval:org.mitre.oval:tst:33209"/>
            <criterion comment="texinfo is earlier than 0:4.7-5.el4.2" test_ref="oval:org.mitre.oval:tst:32963"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10892" version="5" class="vulnerability">
      <metadata>
        <title>Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with "Load Images" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-4570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570"/>
        <description>Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with "Load Images" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:59.803-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:10.307-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:39.695-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10892 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:35.464-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:45.178-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32759"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32989"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32809"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32779"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32954"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32668"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33010"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32811"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:32981"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el3" test_ref="oval:org.mitre.oval:tst:33061"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="devhelp-devel is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:32072"/>
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33120"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32842"/>
            <criterion comment="thunderbird is earlier than 0:1.5.0.7-0.1.el4" test_ref="oval:org.mitre.oval:tst:32910"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32677"/>
            <criterion comment="seamonkey is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32933"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32243"/>
            <criterion comment="devhelp is earlier than 0:0.10-0.4.el4" test_ref="oval:org.mitre.oval:tst:33062"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32978"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33072"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33079"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:32121"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.5-0.1.el4" test_ref="oval:org.mitre.oval:tst:33077"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10888" version="5" class="vulnerability">
      <metadata>
        <title>cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-1999-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1572"/>
        <description>cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:26.509-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:09.172-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:38.443-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10888 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:34.824-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:43.356-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criterion comment="cpio is earlier than 0:2.5-3e.3" test_ref="oval:org.mitre.oval:tst:30735"/>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criterion comment="cpio is earlier than 0:2.5-7.EL4.1" test_ref="oval:org.mitre.oval:tst:30839"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10886" version="5" class="vulnerability">
      <metadata>
        <title>The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2006-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935"/>
        <description>The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:15.622-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:08.525-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:37.735-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10886 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:33.935-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:42.432-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-BOOT is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33074"/>
            <criterion comment="kernel-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32633"/>
            <criterion comment="kernel-smp-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33103"/>
            <criterion comment="kernel-hugemem-unsupported is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33001"/>
            <criterion comment="kernel-hugemem is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32937"/>
            <criterion comment="kernel is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32280"/>
            <criterion comment="kernel-source is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33127"/>
            <criterion comment="kernel-doc is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:32855"/>
            <criterion comment="kernel-smp is earlier than 0:2.4.21-47.0.1.EL" test_ref="oval:org.mitre.oval:tst:33021"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="kernel-hugemem is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32576"/>
            <criterion comment="kernel-hugemem-devel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32814"/>
            <criterion comment="kernel-smp-devel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32958"/>
            <criterion comment="kernel-largesmp-devel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32801"/>
            <criterion comment="kernel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32865"/>
            <criterion comment="kernel-devel is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32880"/>
            <criterion comment="kernel-doc is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32747"/>
            <criterion comment="kernel-largesmp is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32200"/>
            <criterion comment="kernel-smp is earlier than 0:2.6.9-42.0.2.EL" test_ref="oval:org.mitre.oval:tst:32838"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10885" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2010-1199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199"/>
        <description>Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:10.225-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:07.880-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:36.992-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10885 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:57:53.414-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:41.583-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="seamonkey-nspr is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40598"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40703"/>
            <criterion comment="seamonkey-nss-devel is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:39947"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40593"/>
            <criterion comment="seamonkey-nspr-devel is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40651"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:39843"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40800"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40736"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:39844"/>
            <criterion comment="seamonkey-nss is earlier than 0:1.0.9-0.55.el3" test_ref="oval:org.mitre.oval:tst:40686"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="firefox is earlier than 0:3.6.4-8.el4" test_ref="oval:org.mitre.oval:tst:40755"/>
            <criterion comment="seamonkey-mail is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40296"/>
            <criterion comment="seamonkey-js-debugger is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:39850"/>
            <criterion comment="seamonkey-chat is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40624"/>
            <criterion comment="seamonkey-dom-inspector is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40782"/>
            <criterion comment="seamonkey-devel is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40431"/>
            <criterion comment="seamonkey is earlier than 0:1.0.9-58.el4_8" test_ref="oval:org.mitre.oval:tst:40449"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL5, CentOS5, Oracle Linux 5">
          <criteria operator="OR" comment="RHEL5, CentOS5 or Oracle Linux 5">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 5" definition_ref="oval:org.mitre.oval:def:11414"/>
            <extend_definition comment="CentOS Linux 5.x" definition_ref="oval:org.mitre.oval:def:15802"/>
            <extend_definition comment="Oracle Linux 5.x" definition_ref="oval:org.mitre.oval:def:15459"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="gnome-python2-extras is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40435"/>
            <criterion comment="devhelp-devel is earlier than 0:0.12-21.el5" test_ref="oval:org.mitre.oval:tst:40552"/>
            <criterion comment="gnome-python2-libegg is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40721"/>
            <criterion comment="xulrunner-devel is earlier than 0:1.9.2.4-10.el5" test_ref="oval:org.mitre.oval:tst:40480"/>
            <criterion comment="gnome-python2-gtkhtml2 is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40813"/>
            <criterion comment="totem is earlier than 0:2.16.7-7.el5" test_ref="oval:org.mitre.oval:tst:40749"/>
            <criterion comment="xulrunner is earlier than 0:1.9.2.4-10.el5" test_ref="oval:org.mitre.oval:tst:40221"/>
            <criterion comment="gnome-python2-gtkspell is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40385"/>
            <criterion comment="yelp is earlier than 0:2.16.0-26.el5" test_ref="oval:org.mitre.oval:tst:40828"/>
            <criterion comment="devhelp is earlier than 0:0.12-21.el5" test_ref="oval:org.mitre.oval:tst:40814"/>
            <criterion comment="firefox is earlier than 0:3.6.4-8.el5" test_ref="oval:org.mitre.oval:tst:40524"/>
            <criterion comment="totem-mozplugin is earlier than 0:2.16.7-7.el5" test_ref="oval:org.mitre.oval:tst:40620"/>
            <criterion comment="gnome-python2-gtkmozembed is earlier than 0:2.14.2-7.el5" test_ref="oval:org.mitre.oval:tst:40722"/>
            <criterion comment="esc is earlier than 0:1.1.0-12.el5" test_ref="oval:org.mitre.oval:tst:40273"/>
            <criterion comment="totem-devel is earlier than 0:2.16.7-7.el5" test_ref="oval:org.mitre.oval:tst:40637"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10883" version="5" class="vulnerability">
      <metadata>
        <title>The GIF parser in the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) via a malformed image file that triggers a null dereference, a different vulnerability than CVE-2004-0692.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2004-0693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0693"/>
        <description>The GIF parser in the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) via a malformed image file that triggers a null dereference, a different vulnerability than CVE-2004-0692.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:28:33.466-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:07.161-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:36.189-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10883 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:59:19.085-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:40.566-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="AND">
        <criteria operator="OR" comment="RHEL3 or CentOS3">
          <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
          <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
        </criteria>
        <criteria operator="OR" comment="Configuration section">
          <criterion comment="qt-config is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30825"/>
          <criterion comment="qt is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30487"/>
          <criterion comment="qt-devel is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30732"/>
          <criterion comment="qt-MySQL is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30758"/>
          <criterion comment="qt-designer is earlier than 1:3.1.2-13.4" test_ref="oval:org.mitre.oval:tst:30345"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10882" version="5" class="vulnerability">
      <metadata>
        <title>Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2007-4568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4568"/>
        <description>Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:32:46.595-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:06.121-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:35.323-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10882 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:42.594-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:39.211-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="XFree86-cyrillic-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35923"/>
            <criterion comment="XFree86-Xvfb is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35665"/>
            <criterion comment="XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36014"/>
            <criterion comment="XFree86-libs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35929"/>
            <criterion comment="XFree86-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36011"/>
            <criterion comment="XFree86-truetype-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35836"/>
            <criterion comment="XFree86-twm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35726"/>
            <criterion comment="XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35715"/>
            <criterion comment="XFree86-libs-data is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35610"/>
            <criterion comment="XFree86-doc is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36025"/>
            <criterion comment="XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35789"/>
            <criterion comment="XFree86-base-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35804"/>
            <criterion comment="XFree86-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35865"/>
            <criterion comment="XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35793"/>
            <criterion comment="XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35903"/>
            <criterion comment="XFree86-font-utils is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35965"/>
            <criterion comment="XFree86-Mesa-libGL is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35922"/>
            <criterion comment="XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35504"/>
            <criterion comment="XFree86-xdm is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35045"/>
            <criterion comment="XFree86-sdk is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35914"/>
            <criterion comment="XFree86 is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35831"/>
            <criterion comment="XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35998"/>
            <criterion comment="XFree86-Xnest is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35975"/>
            <criterion comment="XFree86-xfs is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:36031"/>
            <criterion comment="XFree86-tools is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35971"/>
            <criterion comment="XFree86-syriac-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35711"/>
            <criterion comment="XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35933"/>
            <criterion comment="XFree86-xauth is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35826"/>
            <criterion comment="XFree86-Mesa-libGLU is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35753"/>
            <criterion comment="XFree86-devel is earlier than 0:4.3.0-126.EL" test_ref="oval:org.mitre.oval:tst:35678"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="xorg-x11-doc is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35795"/>
            <criterion comment="xorg-x11-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35934"/>
            <criterion comment="xorg-x11-xauth is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35467"/>
            <criterion comment="xorg-x11-Mesa-libGLU is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35946"/>
            <criterion comment="xorg-x11-twm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36116"/>
            <criterion comment="xorg-x11-Mesa-libGL is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35116"/>
            <criterion comment="xorg-x11-Xdmx is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36004"/>
            <criterion comment="xorg-x11-xfs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35483"/>
            <criterion comment="xorg-x11-deprecated-libs-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36103"/>
            <criterion comment="xorg-x11-devel is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36060"/>
            <criterion comment="xorg-x11-Xvfb is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36074"/>
            <criterion comment="xorg-x11-deprecated-libs is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35895"/>
            <criterion comment="xorg-x11-sdk is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35905"/>
            <criterion comment="xorg-x11-xdm is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:36012"/>
            <criterion comment="xorg-x11-Xnest is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35984"/>
            <criterion comment="xorg-x11 is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35857"/>
            <criterion comment="xorg-x11-font-utils is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35681"/>
            <criterion comment="xorg-x11-tools is earlier than 0:6.8.2-1.EL.33.0.2" test_ref="oval:org.mitre.oval:tst:35909"/>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.mitre.oval:def:10881" version="5" class="vulnerability">
      <metadata>
        <title>Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow.</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 3</platform>
          <platform>CentOS Linux 3</platform>
          <platform>Red Hat Enterprise Linux 4</platform>
          <platform>CentOS Linux 4</platform>
          <platform>Oracle Linux 4</platform>
          <platform>Red Hat Enterprise Linux 5</platform>
          <platform>CentOS Linux 5</platform>
          <platform>Oracle Linux 5</platform>
        </affected>
        <reference source="CVE" ref_id="CVE-2009-0200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0200"/>
        <description>Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow.</description>
        <oval_repository>
          <dates>
            <submitted date="2010-07-09T03:56:16-04:00">
              <contributor organization="SCAP.com, LLC">Aharon Chernin</contributor>
            </submitted>
            <status_change date="2010-07-28T14:27:53.249-04:00">DRAFT</status_change>
            <status_change date="2010-08-16T04:06:03.911-04:00">INTERIM</status_change>
            <status_change date="2010-09-06T04:06:33.107-04:00">ACCEPTED</status_change>
            <modified comment="EDITED oval:org.mitre.oval:def:10881 - Expanded the vulnerability checks for RHEL 3, 4, and 5 to cover  CentOS 3, 4, 5 and Oracle Linux 4 and 5" date="2013-04-10T15:53:00.376-04:00">
              <contributor organization="G2, Inc.">Dragos Prisaca</contributor>
            </modified>
            <status_change date="2013-04-10T15:58:49.815-04:00">INTERIM</status_change>
            <status_change date="2013-04-29T04:09:36.887-04:00">ACCEPTED</status_change>
          </dates>
          <status>ACCEPTED</status>
        </oval_repository>
      </metadata>
      <criteria operator="OR">
        <criteria operator="AND" comment="OS Section: RHEL3, CentOS3">
          <criteria operator="OR" comment="RHEL3 or CentOS3">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 3" definition_ref="oval:org.mitre.oval:def:11782"/>
            <extend_definition comment="CentOS Linux 3.x" definition_ref="oval:org.mitre.oval:def:16651"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org-libs is earlier than 0:1.1.2-44.2.0.EL3" test_ref="oval:org.mitre.oval:tst:39319"/>
            <criterion comment="openoffice.org is earlier than 0:1.1.2-44.2.0.EL3" test_ref="oval:org.mitre.oval:tst:38381"/>
            <criterion comment="openoffice.org-i18n is earlier than 0:1.1.2-44.2.0.EL3" test_ref="oval:org.mitre.oval:tst:39146"/>
          </criteria>
        </criteria>
        <criteria operator="AND" comment="OS Section: RHEL4, CentOS4, Oracle Linux 4">
          <criteria operator="OR" comment="RHEL4, CentOS4 or Oracle Linux 4">
            <extend_definition comment="The operating system installed on the system is Red Hat Enterprise Linux 4" definition_ref="oval:org.mitre.oval:def:11831"/>
            <extend_definition comment="CentOS Linux 4.x" definition_ref="oval:org.mitre.oval:def:16636"/>
            <extend_definition comment="Oracle Linux 4.x" definition_ref="oval:org.mitre.oval:def:15990"/>
          </criteria>
          <criteria operator="OR" comment="Configuration section">
            <criterion comment="openoffice.org2-langpack-lt_LT is earlier than 1:2.0.4-5.7.0.6.0.1" test_ref="oval:org.mitre.oval:tst:39278"/>
            <criterion comment="openoffice.org2-langpack-nn_NO is earlier than 1:2.0.4-5.7.0.6.0.1" test_ref="oval:org.mitre.oval:tst:39127"/>
            <criterion comment="openoffice.org2-langpack-ga_IE is earlier than 1:2.0.4-5.7.0.6.0.1" test_ref="oval:org.mitre.oval:tst:39215"/>
            <criterion comment="openoffice.org2-langpack-zh_CN is earlier than 1:2.0.4-5.7.0.6.0.1" test_ref="oval:org.mitre.oval:tst:39334"/>
            <criterion comment="openoffice.org2-javafilter is earlier than 1:2.0.4-5.7.0.6.0.1" test_ref="oval:org.mitre.oval:tst:39040"/>
            <criterion comment="openoffice.org2-langpack-he_IL is earlier than 1:2.0.4-5.7.0.6.0.1" test_ref="