Hewlett-Packard Tru64 UNIX V5.1A

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status archived
Valid from 01.02.2004
Valid until 05.03.2013
Scheme 🇬🇧 UK
Manufacturer Hewlett-Packard Company
Category Operating Systems
Security level EAL1

Heuristics summary

Certificate ID: CRP199

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Security level
EAL1, EAL7
Certificates
CERTIFICATION REPORT No. P199

Certification process
out of scope, The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user, respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE

Standards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title tru64_cr_1_0.doc
Author racook
Creation date D:20040213085521Z
Modification date D:20131204151403Z
Pages 24
Creator tru64_cr_1_0 - Microsoft Word
Producer Acrobat PDFWriter 5.0 for Windows NT

Security target

Extracted keywords

Symmetric Algorithms
E2

Security level
EAL1, EAL3
Claims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.AUDITING, O.RESIDUAL_INFORMATION, O.MANAGE, O.ENFORCEMENT, O.INSTALL, O.PHYSICAL, O.CREDEN, A.NETWORK, A.CONNECT, A.PEER, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADM, A.COOP
Security Assurance Requirements (SAR)
ACM_CAP.1, ADO_IGS.1, ADV_FSP.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_IND.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.3.1, FAU_GEN.1.2, FAU_SAR.1.2, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_RIP, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_ATD.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.1.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1, FIA_UID.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UID.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MTD, FMT_REV, FMT_SMR.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.3.2, FMT_SMR.1.1, FMT_MTD.1, FPT_AMT.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_STM.1, FPT_STM.1.1, FPT_AMT.1.1, FPT_SEP.1.2

Standards
ISO/IEC 15408, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Tru64ST Issue 1.0.rtf
Author racook
Creation date D:20040218114941
Pages 39
Creator Tru64ST Issue 1.0 - Microsoft Word
Producer Acrobat PDFWriter 5.0 for Windows NT

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CRP199

Extracted SARs

ADV_FSP.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_IND.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2000-1031
C N
MEDIUM 4.6 6.4 11.12.2000
CVE-2002-1604
C N
HIGH 7.5 6.4 02.09.2002
CVE-2002-1605
C N
HIGH 7.5 6.4 02.09.2002
CVE-2002-1606
C N
MEDIUM 4.6 6.4 30.08.2002
CVE-2002-1607
C N
MEDIUM 4.6 6.4 31.08.2002
CVE-2002-1608
C N
MEDIUM 4.6 6.4 31.08.2002
CVE-2002-1609
C N
MEDIUM 4.6 6.4 30.08.2002
CVE-2002-1610
C N
LOW 2.1 2.9 30.08.2002
CVE-2002-1611
C N
MEDIUM 4.6 6.4 30.08.2002
CVE-2002-1612
C N
HIGH 7.2 10.0 13.09.2002
CVE-2002-1613
C N
HIGH 7.2 10.0 10.09.2002
CVE-2002-1614
C N
HIGH 7.2 10.0 09.09.2002
CVE-2002-1615
C N
HIGH 7.2 10.0 13.09.2002
CVE-2002-1616
C N
HIGH 7.2 10.0 01.08.2002
CVE-2002-1617
C N
HIGH 7.2 10.0 31.12.2002
CVE-2002-1784
C N
MEDIUM 5.0 2.9 31.12.2002
CVE-2003-0221
C N
HIGH 7.2 10.0 12.05.2003
CVE-2003-1496
C N
HIGH 10.0 10.0 31.12.2003
CVE-2004-0657
C N
MEDIUM 5.0 2.9 06.08.2004
CVE-2004-2678
C N
MEDIUM 5.1 6.4 31.12.2004
CVE-2005-0719
C N
LOW 2.1 2.9 09.03.2005
CVE-2005-2993
C N
LOW 1.7 2.9 20.09.2005
CVE-2005-3670
C N
HIGH 7.8 6.9 18.11.2005
CVE-2006-5452
C N
MEDIUM 4.6 6.4 23.10.2006
CVE-2006-6418
C N
HIGH 7.2 10.0 10.12.2006
CVE-2007-0805
C N
LOW 2.1 2.9 07.02.2007
CVE-2007-2553
C N
HIGH 7.2 10.0 09.05.2007
CVE-2007-2791
C N
HIGH 10.0 10.0 22.05.2007
CVE-2007-6519
C N
MEDIUM 4.9 6.9 24.12.2007
CVE-2008-4414
C N
HIGH 7.2 10.0 07.11.2008
Showing 5 out of 30.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": null,
  "dgst": "d58d29b92347f137",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP199",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*",
        "cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL1",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2007-2553",
        "CVE-2003-1496",
        "CVE-2006-5452",
        "CVE-2002-1605",
        "CVE-2002-1608",
        "CVE-2004-2678",
        "CVE-2002-1604",
        "CVE-2005-2993",
        "CVE-2000-1031",
        "CVE-2002-1617",
        "CVE-2005-3670",
        "CVE-2005-0719",
        "CVE-2002-1614",
        "CVE-2008-4414",
        "CVE-2003-0221",
        "CVE-2002-1606",
        "CVE-2002-1612",
        "CVE-2002-1611",
        "CVE-2002-1615",
        "CVE-2002-1607",
        "CVE-2006-6418",
        "CVE-2002-1784",
        "CVE-2002-1610",
        "CVE-2007-6519",
        "CVE-2002-1616",
        "CVE-2004-0657",
        "CVE-2007-2791",
        "CVE-2002-1609",
        "CVE-2002-1613",
        "CVE-2007-0805"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Hewlett-Packard Company",
  "manufacturer_web": "https://www.hp.com",
  "name": "Hewlett-Packard Tru64 UNIX V5.1A",
  "not_valid_after": "2013-03-05",
  "not_valid_before": "2004-02-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "CRP199.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CERTIFICATION REPORT No. P199": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL1": 18,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE\u2019s user": 1,
          "out of scope": 2,
          "respond to requests for Telnet \u0026 FTP services. The network, including clients of FTP \u0026 Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "racook",
      "/CreationDate": "D:20040213085521Z",
      "/Creator": "tru64_cr_1_0 - Microsoft Word",
      "/ModDate": "D:20131204151403Z",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Title": "tru64_cr_1_0.doc",
      "pdf_file_size_bytes": 84416,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "Tru64STIssue1.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECT": 6,
          "A.COOP": 1,
          "A.LOCATE": 1,
          "A.MANAGE": 1,
          "A.NETWORK": 6,
          "A.NO_EVIL_ADM": 1,
          "A.PEER": 5,
          "A.PROTECT": 1
        },
        "O": {
          "O.AUDITING": 1,
          "O.AUTHORIZATION": 1,
          "O.CREDEN": 1,
          "O.DISCRETIONARY_ACCESS": 1,
          "O.ENFORCEMENT": 1,
          "O.INSTALL": 3,
          "O.MANAGE": 1,
          "O.PHYSICAL": 2,
          "O.RESIDUAL_INFORMATION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.1": 1
        },
        "ADO": {
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.1": 1,
          "ADV_RCR.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_USR.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 12,
          "EAL3": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 1,
          "FAU_GEN.2.1": 2,
          "FAU_SAR.1": 1,
          "FAU_SAR.1.1": 2,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 1,
          "FAU_SAR.2.1": 2,
          "FAU_SAR.3": 2,
          "FAU_SAR.3.1": 2,
          "FAU_SEL.1": 2,
          "FAU_SEL.1.1": 2,
          "FAU_STG.1": 1,
          "FAU_STG.1.1": 2,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 2,
          "FAU_STG.3.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 2,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_RIP": 3
        },
        "FIA": {
          "FIA_ATD.1": 2,
          "FIA_ATD.1.1": 3,
          "FIA_SOS.1": 1,
          "FIA_SOS.1.1": 3,
          "FIA_UAU.1": 2,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.7": 1,
          "FIA_UAU.7.1": 2,
          "FIA_UID.1": 2,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2
        },
        "FMT": {
          "FMT_MSA.1": 2,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 1,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD": 14,
          "FMT_MTD.1": 1,
          "FMT_REV": 12,
          "FMT_SMR.1": 2,
          "FMT_SMR.1.1": 4,
          "FMT_SMR.1.2": 3
        },
        "FPT": {
          "FPT_AMT.1": 2,
          "FPT_AMT.1.1": 2,
          "FPT_RVM.1": 1,
          "FPT_RVM.1.1": 2,
          "FPT_SEP.1": 1,
          "FPT_SEP.1.1": 2,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 1,
          "FPT_STM.1.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        },
        "ISO": {
          "ISO/IEC 15408": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "E2": {
            "E2": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "racook",
      "/CreationDate": "D:20040218114941",
      "/Creator": "Tru64ST Issue 1.0 - Microsoft Word",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Title": "Tru64ST Issue 1.0.rtf",
      "pdf_file_size_bytes": 158515,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 39
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP199.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tru64STIssue1.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8dcdc7007df61755bec34923df30eee412307da9b1d2aa03ffcbee0f8a991c56",
      "txt_hash": "652d1c2e04d08992b41b2c3a29898700ff936b672e5a9d377e8df93f43700715"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ba3e7a7196705d07f4bf534849f049aae30db8865c4649fd52e5b57ef9239bec",
      "txt_hash": "4d003c662cbf7e051e7cb579394cb74e916124b190ba01824edc940c3b73de41"
    }
  },
  "status": "archived"
}