Action not permitted
Modal body text goes here.
Modal Title
Modal Body
rhsa-2008:0789
Vulnerability from csaf_redhat
Published
2008-08-11 17:02
Modified
2024-11-22 02:04
Summary
Red Hat Security Advisory: dnsmasq security update
Notes
Topic
An updated dnsmasq package that implements UDP source-port randomization
is now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Dnsmasq is lightweight DNS forwarder and DHCP server. It is designed to
provide DNS and, optionally, DHCP, to a small network.
The dnsmasq DNS resolver used a fixed source UDP port. This could have made
DNS spoofing attacks easier. dnsmasq has been updated to use random UDP
source ports, helping to make DNS spoofing attacks harder. (CVE-2008-1447)
All dnsmasq users are advised to upgrade to this updated package, that
upgrades dnsmasq to version 2.45, which resolves this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated dnsmasq package that implements UDP source-port randomization\nis now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Dnsmasq is lightweight DNS forwarder and DHCP server. It is designed to\nprovide DNS and, optionally, DHCP, to a small network.\n\nThe dnsmasq DNS resolver used a fixed source UDP port. This could have made\nDNS spoofing attacks easier. dnsmasq has been updated to use random UDP\nsource ports, helping to make DNS spoofing attacks harder. (CVE-2008-1447)\n\nAll dnsmasq users are advised to upgrade to this updated package, that\nupgrades dnsmasq to version 2.45, which resolves this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0789", "url": "https://access.redhat.com/errata/RHSA-2008:0789" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG", "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "category": "external", "summary": "449345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0789.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-22T02:04:18+00:00", "generator": { "date": "2024-11-22T02:04:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0789", "initial_release_date": "2008-08-11T17:02:00+00:00", "revision_history": [ { "date": "2008-08-11T17:02:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-11T13:02:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:04:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.45-1.el5_2.1.src", "product": { "name": "dnsmasq-0:2.45-1.el5_2.1.src", "product_id": "dnsmasq-0:2.45-1.el5_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.45-1.el5_2.1.x86_64", "product": { "name": "dnsmasq-0:2.45-1.el5_2.1.x86_64", "product_id": "dnsmasq-0:2.45-1.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64", "product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.45-1.el5_2.1.i386", "product": { "name": "dnsmasq-0:2.45-1.el5_2.1.i386", "product_id": "dnsmasq-0:2.45-1.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386", "product": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386", "product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.45-1.el5_2.1.ia64", "product": { "name": "dnsmasq-0:2.45-1.el5_2.1.ia64", "product_id": "dnsmasq-0:2.45-1.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64", "product": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64", "product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.45-1.el5_2.1.ppc", "product": { "name": "dnsmasq-0:2.45-1.el5_2.1.ppc", "product_id": "dnsmasq-0:2.45-1.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc", "product": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc", "product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.45-1.el5_2.1.s390x", "product": { "name": "dnsmasq-0:2.45-1.el5_2.1.s390x", "product_id": "dnsmasq-0:2.45-1.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x", "product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.i386" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.ia64" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.ppc" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.s390x" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.src" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.i386" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.ia64" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.ppc" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.s390x" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.src" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64" }, "product_reference": "dnsmasq-0:2.45-1.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Dan Kaminsky" ] } ], "cve": "CVE-2008-1447", "discovery_date": "2008-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "449345" } ], "notes": [ { "category": "description", "text": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: implement source UDP port randomization (CERT VU#800113)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:dnsmasq-0:2.45-1.el5_2.1.i386", "5Client:dnsmasq-0:2.45-1.el5_2.1.ia64", "5Client:dnsmasq-0:2.45-1.el5_2.1.ppc", "5Client:dnsmasq-0:2.45-1.el5_2.1.s390x", "5Client:dnsmasq-0:2.45-1.el5_2.1.src", "5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64", "5Server:dnsmasq-0:2.45-1.el5_2.1.i386", "5Server:dnsmasq-0:2.45-1.el5_2.1.ia64", "5Server:dnsmasq-0:2.45-1.el5_2.1.ppc", "5Server:dnsmasq-0:2.45-1.el5_2.1.s390x", "5Server:dnsmasq-0:2.45-1.el5_2.1.src", "5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1447" }, { "category": "external", "summary": "RHBZ#449345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1447", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447" } ], "release_date": "2008-07-08T18:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-11T17:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:dnsmasq-0:2.45-1.el5_2.1.i386", "5Client:dnsmasq-0:2.45-1.el5_2.1.ia64", "5Client:dnsmasq-0:2.45-1.el5_2.1.ppc", "5Client:dnsmasq-0:2.45-1.el5_2.1.s390x", "5Client:dnsmasq-0:2.45-1.el5_2.1.src", "5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x", "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64", "5Server:dnsmasq-0:2.45-1.el5_2.1.i386", "5Server:dnsmasq-0:2.45-1.el5_2.1.ia64", "5Server:dnsmasq-0:2.45-1.el5_2.1.ppc", "5Server:dnsmasq-0:2.45-1.el5_2.1.s390x", "5Server:dnsmasq-0:2.45-1.el5_2.1.src", "5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x", "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0789" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: implement source UDP port randomization (CERT VU#800113)" } ] }
CVE-2008-1447 (GCVE-0-2008-1447)
Vulnerability from cvelistv5
Published
2008-07-08 23:00
Modified
2024-08-07 08:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:24:42.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1020438", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020438" }, { "name": "FEDORA-2008-6256", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html" }, { "name": "SUSE-SR:2008:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "name": "VU#800113", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/800113" }, { "name": "31137", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31137" }, { "name": "31430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31430" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J" }, { "name": "31169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31169" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phys.uu.nl/~rombouts/pdnsd.html" }, { "name": "1020702", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020702" }, { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ADV-2008-2052", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2052/references" }, { "name": "1020561", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020561" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html" }, { "name": "HPSBOV03226", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2" }, { "name": "1020578", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020578" }, { "name": "FreeBSD-SA-08:06", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc" }, { "name": "oval:org.mitre.oval:def:9627", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627" }, { "name": "1020802", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020802" }, { "name": "HPSBMP02404", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2" }, { "name": "30131", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30131" }, { "name": "[4.2] 013: SECURITY FIX: July 23, 2008", "tags": [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred" ], "url": "http://www.openbsd.org/errata42.html#013_bind" }, { "name": "31236", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31236" }, { "name": "APPLE-SA-2008-09-15", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" }, { "name": "1020651", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020651" }, { "name": "1020437", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020437" }, { "name": "31209", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31209" }, { "name": "31012", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31012" }, { "name": "31151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31151" }, { "name": "ADV-2008-2050", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2050/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.citrix.com/article/CTX117991" }, { "name": "SSRT101004", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2" }, { "name": "31237", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31237" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog" }, { "name": "APPLE-SA-2008-07-31", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "name": "win-dns-client-server-spoofing(43334)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334" }, { "name": "31495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31495" }, { "name": "6130", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6130" }, { "name": "20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml" }, { "name": "1020579", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020579" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nominum.com/asset_upload_file741_2661.pdf" }, { "name": "1020653", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020653" }, { "name": "30998", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30998" }, { "name": "DSA-1603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1603" }, { "name": "ADV-2008-2525", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2525" }, { "name": "SUSE-SA:2008:033", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html" }, { "name": "31094", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31094" }, { "name": "IZ26668", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668" }, { "name": "31687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31687" }, { "name": "ADV-2008-2025", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2025/references" }, { "name": "239392", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1" }, { "name": "TA08-260A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html" }, { "name": "31588", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31588" }, { "name": "31019", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31019" }, { "name": "ADV-2008-2029", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2029/references" }, { "name": "SSRT080058", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2" }, { "name": "6123", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6123" }, { "name": "IZ26671", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671" }, { "name": "FEDORA-2008-6281", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html" }, { "name": "ADV-2008-2268", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "name": "ADV-2009-0297", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0297" }, { "name": "HPSBUX02351", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2" }, { "name": "31207", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31207" }, { "name": "31031", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31031" }, { "name": "ADV-2008-2584", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2584" }, { "name": "31451", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31451" }, { "name": "ADV-2008-2051", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2051/references" }, { "name": "30977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30977" }, { "name": "RHSA-2008:0789", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html" }, { "name": "ADV-2008-2377", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2377" }, { "name": "HPSBNS02405", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368" }, { "name": "1020558", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020558" }, { "name": "31221", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31221" }, { "name": "RHSA-2008:0533", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html" }, { "name": "[4.3] 004: SECURITY FIX: July 23, 2008", "tags": [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred" ], "url": "http://www.openbsd.org/errata43.html#004_bind" }, { "name": "1020804", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020804" }, { "name": "31143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31143" }, { "name": "20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded" }, { "name": "ADV-2008-2195", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2195/references" }, { "name": "ADV-2008-2196", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2196/references" }, { "name": "33714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33714" }, { "name": "HPSBTU02358", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2" }, { "name": "33786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33786" }, { "name": "1020448", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020448" }, { "name": "31882", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31882" }, { "name": "ADV-2008-2384", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2384" }, { "name": "IZ26669", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html" }, { "name": "ADV-2008-2123", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2123/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3026" }, { "name": "31014", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31014" }, { "name": "30979", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30979" }, { "name": "1020575", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020575" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/" }, { "name": "ADV-2008-2482", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2482" }, { "name": "IZ26672", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3129" }, { "name": "DSA-1619", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1619" }, { "name": "ADV-2008-2166", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2166/references" }, { "name": "31072", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31072" }, { "name": "ADV-2008-2139", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2139/references" }, { "name": "oval:org.mitre.oval:def:5761", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761" }, { "name": "ADV-2008-2092", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2092/references" }, { "name": "31482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31482" }, { "name": "IZ26670", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670" }, { "name": "MDVSA-2008:139", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139" }, { "name": "oval:org.mitre.oval:def:5917", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917" }, { "name": "30989", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30989" }, { "name": "ADV-2008-2055", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2055/references" }, { "name": "SSRT071449", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40" }, { "name": "31065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31065" }, { "name": "31254", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31254" }, { "name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.doxpara.com/?p=1176" }, { "name": "NetBSD-SA2008-009", "tags": [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc" }, { "name": "USN-627-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-627-1" }, { "name": "ADV-2010-0622", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0622" }, { "name": "1020576", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020576" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php" }, { "name": "HPSBOV02357", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520" }, { "name": "31153", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31153" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231" }, { "name": "ADV-2008-2549", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2549" }, { "name": "IZ26667", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html" }, { "name": "31213", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31213" }, { "name": "31030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31030" }, { "name": "USN-622-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-622-1" }, { "name": "31033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31033" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html" }, { "name": "1020440", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020440" }, { "name": "APPLE-SA-2008-09-12", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.doxpara.com/DMK_BO2K8.ppt" }, { "name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html" }, { "name": "DSA-1604", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1604" }, { "name": "31823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31823" }, { "name": "31326", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31326" }, { "name": "ADV-2008-2558", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2558" }, { "name": "6122", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6122" }, { "name": "oval:org.mitre.oval:def:5725", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt" }, { "name": "cisco-multiple-dns-cache-poisoning(43637)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637" }, { "name": "ADV-2008-2383", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2383" }, { "name": "1020560", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020560" }, { "name": "31900", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31900" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.citrix.com/article/CTX118183" }, { "name": "30925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30925" }, { "name": "ADV-2009-0311", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0311" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" }, { "name": "DSA-1623", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1623" }, { "name": "ADV-2008-2582", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2582" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt" }, { "name": "DSA-1605", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1605" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7000912" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning" }, { "name": "ADV-2008-2342", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2342" }, { "name": "ADV-2008-2114", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2114/references" }, { "name": "30973", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30973" }, { "name": "31204", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31204" }, { "name": "31354", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31354" }, { "name": "GLSA-200812-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200812-17.xml" }, { "name": "oval:org.mitre.oval:def:12117", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117" }, { "name": "33178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33178" }, { "name": "30988", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30988" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html" }, { "name": "31011", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31011" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html" }, { "name": "ADV-2008-2334", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2334" }, { "name": "1020577", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020577" }, { "name": "31422", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31422" }, { "name": "31197", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31197" }, { "name": "1020548", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020548" }, { "name": "ADV-2008-2467", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2467" }, { "name": "240048", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1" }, { "name": "TA08-190B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html" }, { "name": "TA08-190A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html" }, { "name": "GLSA-200807-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200807-08.xml" }, { "name": "31022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31022" }, { "name": "SSA:2008-191", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239" }, { "name": "1020449", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020449" }, { "name": "31093", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31093" }, { "name": "31052", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31052" }, { "name": "30980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30980" }, { "name": "SSA:2008-205-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401" }, { "name": "31199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31199" }, { "name": "ADV-2008-2030", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2030/references" }, { "name": "ADV-2008-2291", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2291" }, { "name": "ADV-2008-2023", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2023/references" }, { "name": "SSRT090014", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2" }, { "name": "ADV-2008-2466", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2466" }, { "name": "MS08-037", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037" }, { "name": "31212", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31212" }, { "name": "ADV-2008-2113", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2113/references" }, { "name": "31152", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31152" }, { "name": "ADV-2008-2019", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2019/references" }, { "name": "ADV-2008-2197", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2197/references" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "1020438", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020438" }, { "name": "FEDORA-2008-6256", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html" }, { "name": "SUSE-SR:2008:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "name": "VU#800113", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/800113" }, { "name": "31137", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31137" }, { "name": "31430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31430" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J" }, { "name": "31169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31169" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phys.uu.nl/~rombouts/pdnsd.html" }, { "name": "1020702", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020702" }, { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ADV-2008-2052", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2052/references" }, { "name": "1020561", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020561" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html" }, { "name": "HPSBOV03226", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2" }, { "name": "1020578", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020578" }, { "name": "FreeBSD-SA-08:06", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc" }, { "name": "oval:org.mitre.oval:def:9627", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627" }, { "name": "1020802", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020802" }, { "name": "HPSBMP02404", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2" }, { "name": "30131", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30131" }, { "name": "[4.2] 013: SECURITY FIX: July 23, 2008", "tags": [ "vendor-advisory", "x_refsource_OPENBSD" ], "url": "http://www.openbsd.org/errata42.html#013_bind" }, { "name": "31236", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31236" }, { "name": "APPLE-SA-2008-09-15", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" }, { "name": "1020651", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020651" }, { "name": "1020437", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020437" }, { "name": "31209", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31209" }, { "name": "31012", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31012" }, { "name": "31151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31151" }, { "name": "ADV-2008-2050", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2050/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.citrix.com/article/CTX117991" }, { "name": "SSRT101004", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2" }, { "name": "31237", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31237" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog" }, { "name": "APPLE-SA-2008-07-31", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "name": "win-dns-client-server-spoofing(43334)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334" }, { "name": "31495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31495" }, { "name": "6130", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6130" }, { "name": "20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml" }, { "name": "1020579", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020579" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nominum.com/asset_upload_file741_2661.pdf" }, { "name": "1020653", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020653" }, { "name": "30998", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30998" }, { "name": "DSA-1603", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1603" }, { "name": "ADV-2008-2525", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2525" }, { "name": "SUSE-SA:2008:033", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html" }, { "name": "31094", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31094" }, { "name": "IZ26668", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668" }, { "name": "31687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31687" }, { "name": "ADV-2008-2025", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2025/references" }, { "name": "239392", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1" }, { "name": "TA08-260A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html" }, { "name": "31588", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31588" }, { "name": "31019", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31019" }, { "name": "ADV-2008-2029", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2029/references" }, { "name": "SSRT080058", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2" }, { "name": "6123", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6123" }, { "name": "IZ26671", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671" }, { "name": "FEDORA-2008-6281", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html" }, { "name": "ADV-2008-2268", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "name": "ADV-2009-0297", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0297" }, { "name": "HPSBUX02351", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2" }, { "name": "31207", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31207" }, { "name": "31031", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31031" }, { "name": "ADV-2008-2584", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2584" }, { "name": "31451", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31451" }, { "name": "ADV-2008-2051", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2051/references" }, { "name": "30977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30977" }, { "name": "RHSA-2008:0789", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html" }, { "name": "ADV-2008-2377", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2377" }, { "name": "HPSBNS02405", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368" }, { "name": "1020558", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020558" }, { "name": "31221", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31221" }, { "name": "RHSA-2008:0533", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html" }, { "name": "[4.3] 004: SECURITY FIX: July 23, 2008", "tags": [ "vendor-advisory", "x_refsource_OPENBSD" ], "url": "http://www.openbsd.org/errata43.html#004_bind" }, { "name": "1020804", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020804" }, { "name": "31143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31143" }, { "name": "20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded" }, { "name": "ADV-2008-2195", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2195/references" }, { "name": "ADV-2008-2196", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2196/references" }, { "name": "33714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33714" }, { "name": "HPSBTU02358", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2" }, { "name": "33786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33786" }, { "name": "1020448", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020448" }, { "name": "31882", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31882" }, { "name": "ADV-2008-2384", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2384" }, { "name": "IZ26669", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html" }, { "name": "ADV-2008-2123", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2123/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3026" }, { "name": "31014", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31014" }, { "name": "30979", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30979" }, { "name": "1020575", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020575" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/" }, { "name": "ADV-2008-2482", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2482" }, { "name": "IZ26672", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3129" }, { "name": "DSA-1619", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1619" }, { "name": "ADV-2008-2166", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2166/references" }, { "name": "31072", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31072" }, { "name": "ADV-2008-2139", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2139/references" }, { "name": "oval:org.mitre.oval:def:5761", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761" }, { "name": "ADV-2008-2092", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2092/references" }, { "name": "31482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31482" }, { "name": "IZ26670", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670" }, { "name": "MDVSA-2008:139", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139" }, { "name": "oval:org.mitre.oval:def:5917", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917" }, { "name": "30989", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30989" }, { "name": "ADV-2008-2055", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2055/references" }, { "name": "SSRT071449", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40" }, { "name": "31065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31065" }, { "name": "31254", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31254" }, { "name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.doxpara.com/?p=1176" }, { "name": "NetBSD-SA2008-009", "tags": [ "vendor-advisory", "x_refsource_NETBSD" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc" }, { "name": "USN-627-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-627-1" }, { "name": "ADV-2010-0622", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0622" }, { "name": "1020576", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020576" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php" }, { "name": "HPSBOV02357", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520" }, { "name": "31153", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31153" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231" }, { "name": "ADV-2008-2549", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2549" }, { "name": "IZ26667", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html" }, { "name": "31213", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31213" }, { "name": "31030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31030" }, { "name": "USN-622-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-622-1" }, { "name": "31033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31033" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html" }, { "name": "1020440", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020440" }, { "name": "APPLE-SA-2008-09-12", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.doxpara.com/DMK_BO2K8.ppt" }, { "name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html" }, { "name": "DSA-1604", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1604" }, { "name": "31823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31823" }, { "name": "31326", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31326" }, { "name": "ADV-2008-2558", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2558" }, { "name": "6122", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6122" }, { "name": "oval:org.mitre.oval:def:5725", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt" }, { "name": "cisco-multiple-dns-cache-poisoning(43637)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637" }, { "name": "ADV-2008-2383", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2383" }, { "name": "1020560", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020560" }, { "name": "31900", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31900" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.citrix.com/article/CTX118183" }, { "name": "30925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30925" }, { "name": "ADV-2009-0311", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0311" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" }, { "name": "DSA-1623", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1623" }, { "name": "ADV-2008-2582", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2582" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt" }, { "name": "DSA-1605", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1605" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=7000912" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning" }, { "name": "ADV-2008-2342", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2342" }, { "name": "ADV-2008-2114", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2114/references" }, { "name": "30973", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30973" }, { "name": "31204", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31204" }, { "name": "31354", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31354" }, { "name": "GLSA-200812-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200812-17.xml" }, { "name": "oval:org.mitre.oval:def:12117", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117" }, { "name": "33178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33178" }, { "name": "30988", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30988" }, { "name": "APPLE-SA-2008-09-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html" }, { "name": "31011", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31011" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html" }, { "name": "ADV-2008-2334", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2334" }, { "name": "1020577", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020577" }, { "name": "31422", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31422" }, { "name": "31197", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31197" }, { "name": "1020548", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020548" }, { "name": "ADV-2008-2467", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2467" }, { "name": "240048", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1" }, { "name": "TA08-190B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html" }, { "name": "TA08-190A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html" }, { "name": "GLSA-200807-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200807-08.xml" }, { "name": "31022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31022" }, { "name": "SSA:2008-191", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239" }, { "name": "1020449", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020449" }, { "name": "31093", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31093" }, { "name": "31052", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31052" }, { "name": "30980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30980" }, { "name": "SSA:2008-205-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401" }, { "name": "31199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31199" }, { "name": "ADV-2008-2030", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2030/references" }, { "name": "ADV-2008-2291", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2291" }, { "name": "ADV-2008-2023", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2023/references" }, { "name": "SSRT090014", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2" }, { "name": "ADV-2008-2466", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2466" }, { "name": "MS08-037", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037" }, { "name": "31212", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31212" }, { "name": "ADV-2008-2113", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2113/references" }, { "name": "31152", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31152" }, { "name": "ADV-2008-2019", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2019/references" }, { "name": "ADV-2008-2197", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2197/references" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2008-1447", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1020438", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020438" }, { "name": "FEDORA-2008-6256", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html" }, { "name": "SUSE-SR:2008:017", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "name": "VU#800113", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/800113" }, { "name": "31137", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31137" }, { "name": "31430", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31430" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J" }, { "name": "31169", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31169" }, { "name": "http://www.phys.uu.nl/~rombouts/pdnsd.html", "refsource": "CONFIRM", "url": "http://www.phys.uu.nl/~rombouts/pdnsd.html" }, { "name": "1020702", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020702" }, { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ADV-2008-2052", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2052/references" }, { "name": "1020561", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020561" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html" }, { "name": "HPSBOV03226", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2" }, { "name": "1020578", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020578" }, { "name": "FreeBSD-SA-08:06", "refsource": "FREEBSD", "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc" }, { "name": "oval:org.mitre.oval:def:9627", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627" }, { "name": "1020802", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020802" }, { "name": "HPSBMP02404", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2" }, { "name": "30131", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30131" }, { "name": "[4.2] 013: SECURITY FIX: July 23, 2008", "refsource": "OPENBSD", "url": "http://www.openbsd.org/errata42.html#013_bind" }, { "name": "31236", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31236" }, { "name": "APPLE-SA-2008-09-15", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html" }, { "name": "1020651", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020651" }, { "name": "1020437", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020437" }, { "name": "31209", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31209" }, { "name": "31012", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31012" }, { "name": "31151", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31151" }, { "name": "ADV-2008-2050", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2050/references" }, { "name": "http://support.citrix.com/article/CTX117991", "refsource": "CONFIRM", "url": "http://support.citrix.com/article/CTX117991" }, { "name": "SSRT101004", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2" }, { "name": "31237", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31237" }, { "name": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog", "refsource": "CONFIRM", "url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog" }, { "name": "APPLE-SA-2008-07-31", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" }, { "name": "win-dns-client-server-spoofing(43334)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334" }, { "name": "31495", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31495" }, { "name": "6130", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6130" }, { "name": "20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml" }, { "name": "1020579", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020579" }, { "name": "http://www.nominum.com/asset_upload_file741_2661.pdf", "refsource": "MISC", "url": "http://www.nominum.com/asset_upload_file741_2661.pdf" }, { "name": "1020653", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020653" }, { "name": "30998", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30998" }, { "name": "DSA-1603", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1603" }, { "name": "ADV-2008-2525", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2525" }, { "name": "SUSE-SA:2008:033", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html" }, { "name": "31094", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31094" }, { "name": "IZ26668", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668" }, { "name": "31687", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31687" }, { "name": "ADV-2008-2025", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2025/references" }, { "name": "239392", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1" }, { "name": "TA08-260A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html" }, { "name": "31588", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31588" }, { "name": "31019", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31019" }, { "name": "ADV-2008-2029", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2029/references" }, { "name": "SSRT080058", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2" }, { "name": "6123", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6123" }, { "name": "IZ26671", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671" }, { "name": "FEDORA-2008-6281", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html" }, { "name": "ADV-2008-2268", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "name": "ADV-2009-0297", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0297" }, { "name": "HPSBUX02351", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2" }, { "name": "31207", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31207" }, { "name": "31031", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31031" }, { "name": "ADV-2008-2584", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2584" }, { "name": "31451", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31451" }, { "name": "ADV-2008-2051", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2051/references" }, { "name": "30977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30977" }, { "name": "RHSA-2008:0789", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html" }, { "name": "ADV-2008-2377", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2377" }, { "name": "HPSBNS02405", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368" }, { "name": "1020558", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020558" }, { "name": "31221", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31221" }, { "name": "RHSA-2008:0533", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html" }, { "name": "[4.3] 004: SECURITY FIX: July 23, 2008", "refsource": "OPENBSD", "url": "http://www.openbsd.org/errata43.html#004_bind" }, { "name": "1020804", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020804" }, { "name": "31143", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31143" }, { "name": "20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded" }, { "name": "ADV-2008-2195", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2195/references" }, { "name": "ADV-2008-2196", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2196/references" }, { "name": "33714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33714" }, { "name": "HPSBTU02358", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2" }, { "name": "33786", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33786" }, { "name": "1020448", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020448" }, { "name": "31882", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31882" }, { "name": "ADV-2008-2384", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2384" }, { "name": "IZ26669", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669" }, { "name": "http://up2date.astaro.com/2008/08/up2date_7202_released.html", "refsource": "CONFIRM", "url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html" }, { "name": "ADV-2008-2123", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2123/references" }, { "name": "http://support.apple.com/kb/HT3026", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3026" }, { "name": "31014", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31014" }, { "name": "30979", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30979" }, { "name": "1020575", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020575" }, { "name": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/", "refsource": "CONFIRM", "url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/" }, { "name": "ADV-2008-2482", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2482" }, { "name": "IZ26672", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672" }, { "name": "http://support.apple.com/kb/HT3129", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3129" }, { "name": "DSA-1619", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1619" }, { "name": "ADV-2008-2166", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2166/references" }, { "name": "31072", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31072" }, { "name": "ADV-2008-2139", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2139/references" }, { "name": "oval:org.mitre.oval:def:5761", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761" }, { "name": "ADV-2008-2092", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2092/references" }, { "name": "31482", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31482" }, { "name": "IZ26670", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670" }, { "name": "MDVSA-2008:139", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139" }, { "name": "oval:org.mitre.oval:def:5917", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917" }, { "name": "30989", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30989" }, { "name": "ADV-2008-2055", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2055/references" }, { "name": "SSRT071449", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368" }, { "name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152", "refsource": "CONFIRM", "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152" }, { "name": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40", "refsource": "CONFIRM", "url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40" }, { "name": "31065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31065" }, { "name": "31254", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31254" }, { "name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded" }, { "name": "http://www.doxpara.com/?p=1176", "refsource": "MISC", "url": "http://www.doxpara.com/?p=1176" }, { "name": "NetBSD-SA2008-009", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc" }, { "name": "USN-627-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-627-1" }, { "name": "ADV-2010-0622", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0622" }, { "name": "1020576", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020576" }, { "name": "http://www.isc.org/index.pl?/sw/bind/bind-security.php", "refsource": "CONFIRM", "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php" }, { "name": "HPSBOV02357", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520" }, { "name": "31153", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31153" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231" }, { "name": "ADV-2008-2549", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2549" }, { "name": "IZ26667", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667" }, { "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html", "refsource": "CONFIRM", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html" }, { "name": "31213", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31213" }, { "name": "31030", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31030" }, { "name": "USN-622-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-622-1" }, { "name": "31033", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31033" }, { "name": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html", "refsource": "MISC", "url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html" }, { "name": "1020440", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020440" }, { "name": "APPLE-SA-2008-09-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html" }, { "name": "http://www.doxpara.com/DMK_BO2K8.ppt", "refsource": "MISC", "url": "http://www.doxpara.com/DMK_BO2K8.ppt" }, { "name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html" }, { "name": "DSA-1604", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1604" }, { "name": "31823", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31823" }, { "name": "31326", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31326" }, { "name": "ADV-2008-2558", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2558" }, { "name": "6122", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6122" }, { "name": "oval:org.mitre.oval:def:5725", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725" }, { "name": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt", "refsource": "MISC", "url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt" }, { "name": "cisco-multiple-dns-cache-poisoning(43637)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637" }, { "name": "ADV-2008-2383", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2383" }, { "name": "1020560", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020560" }, { "name": "31900", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31900" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q" }, { "name": "http://support.citrix.com/article/CTX118183", "refsource": "CONFIRM", "url": "http://support.citrix.com/article/CTX118183" }, { "name": "30925", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30925" }, { "name": "ADV-2009-0311", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0311" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" }, { "name": "DSA-1623", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1623" }, { "name": "ADV-2008-2582", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2582" }, { "name": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt", "refsource": "MISC", "url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt" }, { "name": "DSA-1605", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1605" }, { "name": "http://www.novell.com/support/viewContent.do?externalId=7000912", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=7000912" }, { "name": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning", "refsource": "CONFIRM", "url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning" }, { "name": "ADV-2008-2342", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2342" }, { "name": "ADV-2008-2114", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2114/references" }, { "name": "30973", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30973" }, { "name": "31204", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31204" }, { "name": "31354", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31354" }, { "name": "GLSA-200812-17", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200812-17.xml" }, { "name": "oval:org.mitre.oval:def:12117", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117" }, { "name": "33178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33178" }, { "name": "30988", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30988" }, { "name": "APPLE-SA-2008-09-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html" }, { "name": "31011", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31011" }, { "name": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html", "refsource": "MISC", "url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html" }, { "name": "ADV-2008-2334", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2334" }, { "name": "1020577", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020577" }, { "name": "31422", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31422" }, { "name": "31197", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31197" }, { "name": "1020548", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020548" }, { "name": "ADV-2008-2467", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2467" }, { "name": "240048", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1" }, { "name": "TA08-190B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html" }, { "name": "TA08-190A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html" }, { "name": "GLSA-200807-08", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200807-08.xml" }, { "name": "31022", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31022" }, { "name": "SSA:2008-191", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239" }, { "name": "1020449", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020449" }, { "name": "31093", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31093" }, { "name": "31052", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31052" }, { "name": "30980", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30980" }, { "name": "SSA:2008-205-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401" }, { "name": "31199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31199" }, { "name": "ADV-2008-2030", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2030/references" }, { "name": "ADV-2008-2291", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2291" }, { "name": "ADV-2008-2023", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2023/references" }, { "name": "SSRT090014", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2" }, { "name": "ADV-2008-2466", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2466" }, { "name": "MS08-037", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037" }, { "name": "31212", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31212" }, { "name": "ADV-2008-2113", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2113/references" }, { "name": "31152", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31152" }, { "name": "ADV-2008-2019", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2019/references" }, { "name": "ADV-2008-2197", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2197/references" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2008-1447", "datePublished": "2008-07-08T23:00:00", "dateReserved": "2008-03-21T00:00:00", "dateUpdated": "2024-08-07T08:24:42.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…