navigation bar left navigation bar right

navigation left tab Products navigation right tab
navigation left tab Solutions navigation right tab
navigation left tab Customers navigation right tab
navigation left tab Partner navigation right tab
navigation left tab Resources navigation right tab
navigation left tab Company navigation right tab
navigation left tab Careers navigation right tab
navigation left tab Community navigation right tab

CVE Reference: CVE-2008-1447

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2008-1447

Description:
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/43334
  http://xforce.iss.net/xforce/xfdb/43637

UBUNTU
  http://www.ubuntu.com/usn/usn-622-1
  http://www.ubuntu.com/usn/usn-627-1

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
  http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html

SUNALERT
  http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
  http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1

ST
  1020804
  1020702
  1020449
  1020548
  1020653
  1020448
  1020802
  1020651
  1020578
  1020579
  1020576
  1020577
  1020561
  1020575
  1020438
  1020440
  1020437
  1020558
  1020560

SLACKWARE
  http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
  http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680

SAID
  Secunia Advisory: SA31687
  Secunia Advisory: SA31588
  Secunia Advisory: SA31451
  Secunia Advisory: SA31354
  Secunia Advisory: SA31237
  Secunia Advisory: SA31326
  Secunia Advisory: SA31204
  Secunia Advisory: SA31254
  Secunia Advisory: SA31236
  Secunia Advisory: SA31207
  Secunia Advisory: SA31221
  Secunia Advisory: SA31213
  Secunia Advisory: SA31197
  Secunia Advisory: SA31199
  Secunia Advisory: SA31212
  Secunia Advisory: SA31209
  Secunia Advisory: SA31169
  Secunia Advisory: SA31153
  Secunia Advisory: SA31152
  Secunia Advisory: SA31151
  Secunia Advisory: SA31137
  Secunia Advisory: SA31143
  Secunia Advisory: SA31093
  Secunia Advisory: SA31072
  Secunia Advisory: SA31094
  Secunia Advisory: SA31033
  Secunia Advisory: SA31052
  Secunia Advisory: SA31031
  Secunia Advisory: SA31014
  Secunia Advisory: SA31011
  Secunia Advisory: SA30998
  Secunia Advisory: SA30989
  Secunia Advisory: SA30988
  Secunia Advisory: SA30980
  Secunia Advisory: SA30979
  Secunia Advisory: SA30977
  Secunia Advisory: SA30973
  Secunia Advisory: SA30925
  Secunia Advisory: SA31019
  Secunia Advisory: SA31900
  Secunia Advisory: SA31882
  Secunia Advisory: SA31823
  Secunia Advisory: SA31422
  Secunia Advisory: SA31012
  Secunia Advisory: SA31022
  Secunia Advisory: SA31030
  Secunia Advisory: SA31065
  Secunia Advisory: SA33178
  Secunia Advisory: SA31430
  Secunia Advisory: SA31482
  Secunia Advisory: SA31495
  Secunia Advisory: SA33714
  Secunia Advisory: SA33786

REDHAT
  http://www.redhat.com/support/errata/RHSA-2008-0789.html
  http://rhn.redhat.com/errata/RHSA-2008-0533.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9627
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12117
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5917
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5725
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5761

OPENBSD
  http://www.openbsd.org/errata43.html#004_bind
  http://www.openbsd.org/errata42.html#013_bind

NETBSD

MS
  http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx

MISC
  http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
  http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
  http://www.doxpara.com/?p=1176
  http://www.doxpara.com/DMK_BO2K8.ppt
  http://www.nominum.com/asset_upload_file741_2661.pdf
  http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
  http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html

MILW0RM
  http://www.milw0rm.com/exploits/6130
  http://www.milw0rm.com/exploits/6123
  http://www.milw0rm.com/exploits/6122

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2008:139

HP
  http://marc.info/?l=bugtraq&m=121866517322103&w=2
  http://marc.info/?l=bugtraq&m=123324863916385&w=2
  http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
  http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
  http://marc.info/?l=bugtraq&m=121630706004256&w=2

GENTOO
  http://security.gentoo.org/glsa/glsa-200812-17.xml
  http://security.gentoo.org/glsa/glsa-201209-25.xml
  http://security.gentoo.org/glsa/glsa-200807-08.xml

FULLDISC
  http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html

FREEBSD
  http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc

FEDORA

DEBIAN
  http://www.debian.org/security/2008/dsa-1619
  http://www.debian.org/security/2008/dsa-1623
  http://www.debian.org/security/2008/dsa-1605
  http://www.debian.org/security/2008/dsa-1604
  http://www.debian.org/security/2008/dsa-1603

CONFIRM
  http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
  http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
  http://www.novell.com/support/viewContent.do?externalId=7000912
  http://support.apple.com/kb/HT3026
  http://support.citrix.com/article/CTX118183
  http://www.phys.uu.nl/~rombouts/pdnsd.html
  http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
  http://support.apple.com/kb/HT3129
  http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
  http://www.vmware.com/security/advisories/VMSA-2008-0014.html
  http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
  http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
  http://up2date.astaro.com/2008/08/up2date_7202_released.html
  http://support.citrix.com/article/CTX117991
  http://www.ipcop.org/index.php?name=News&file=article&sid=40
  http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
  http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
  http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
  http://www.isc.org/index.pl?/sw/bind/bind-security.php

CISCO
  http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml

CERT-VN
  800113

CERT
  http://www.us-cert.gov/cas/techalerts/TA08-260A.html
  http://www.us-cert.gov/cas/techalerts/TA08-190A.html
  http://www.us-cert.gov/cas/techalerts/TA08-190B.html

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/495289/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/495869/100/0/threaded

BID
  30131

APPLE
  http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
  http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
  http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
  http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html

AIXAPAR
  http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
  http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
  http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
  http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
  http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
  http://www.ibm.com/support/docview.wss?uid=isg1IZ26668


Return to the previous page.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+