Compaq Computer Corporation Unknown

Updated:  January 28, 2001

Status

Unknown

Vendor Statement

COMPAQ COMPUTER CORPORATION At the time of writing this document, Compaq is currently investigating the potential impact to Compaq's BIND release(s). As further information becomes available Compaq will provide notice of the completion/availability of any necessary patches through AES services (DIA, DSNlink FLASH and posted to the Services WEB page) and be available from your normal Compaq Services Support channel. COMPAQ COMPUTER CORPORATION 9/99

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

Data General Unknown

Updated:  January 28, 2001

Status

Unknown

Vendor Statement

We are investigating. We will provide an update when our investigation is complete.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

Fujitsu Not Affected

Updated:  January 28, 2001

Status

Not Affected

Vendor Statement

Regarding the BIND related vulnerabilities VU#16532/VU#13145/VU#4512, Fujitsu's UXP/V operating system is not vulnerable.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

Sun Microsystems, Inc. Not Affected

Updated:  January 28, 2001

Status

Not Affected

Vendor Statement

After [] investigation, we have concluded that we are also not vulnerable to Vulnerability #2. Therefore please state that Sun is not vulnerable for both VU#16532 and VU#13145..

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

The SCO Group (SCO Unix) Affected

Updated:  January 28, 2001

Status

Affected

Vendor Statement

Santa Cruz Operation, Inc Security patches for the following SCO products will be made available at http://www.sco.com/security UnixWare 7.x.x is also reported to be vulnerable UnixWare 2.x.x is also reported to be vulnerable

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.