ID

VAR-200707-0675


CVE

CVE-2008-1447


TITLE

Multiple DNS implementations vulnerable to cache poisoning

Trust: 0.8

sources: CERT/CC: VU#800113

DESCRIPTION

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug.". Deficiencies in the DNS protocol and common DNS implementations facilitate DNS cache poisoning attacks. ISC (Internet Systems Consortiuim) BIND generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. When the destination address is a DNS port, it will allow remote attackers to bypass CVE-2008 -1447 security protection. And spoof the address returned by the DNS response. RESOLUTION The resolution is to discontinue the use of BIND/iX and migrate DNS services to another platform. =========================================================== Ubuntu Security Notice USN-627-1 July 22, 2008 dnsmasq vulnerability CVE-2008-1447 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.04 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.04 LTS: dnsmasq-base 2.41-2ubuntu2.1 After a standard system upgrade you need to restart Dnsmasq to effect the necessary changes. Details follow: Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Dnsmasq. Updated packages for Ubuntu 8.04 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.diff.gz Size/MD5: 22023 89c0f060733a11e414ef1fa634b17149 http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.dsc Size/MD5: 698 e44ebdb66be7abcaba3f1558b9379abb http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig.tar.gz Size/MD5: 357997 8d0acd6656299a800c4d1be5a1193e39 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1_all.deb Size/MD5: 11962 fbe42757babf0522e92a48438cdf7d0b amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_amd64.deb Size/MD5: 210032 015334862975edd0c6157624b9b4cd6b i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_i386.deb Size/MD5: 202466 87bebd172bae955ef2ae8f2de323a737 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_lpia.deb Size/MD5: 202996 8938160f148e63de63cad64e2721c6d6 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_powerpc.deb Size/MD5: 210320 865aa2d674736978b2b00a8623267fc4 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_sparc.deb Size/MD5: 204034 211f90a72d775d1987b6c3179786546f . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200901-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: pdnsd: Denial of Service and cache poisoning Date: January 11, 2009 Bugs: #231285 ID: 200901-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Two errors in pdnsd allow for Denial of Service and cache poisoning. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/pdnsd < 1.2.7 >= 1.2.7 Description =========== Two issues have been reported in pdnsd: * The p_exec_query() function in src/dns_query.c does not properly handle many entries in the answer section of a DNS reply, related to a "dangling pointer bug" (CVE-2008-4194). * The default value for query_port_start was set to 0, disabling UDP source port randomization for outgoing queries (CVE-2008-1447). lead to the redirection of web or mail traffic to malicious sites. The first issue can be exploited by enticing pdnsd to send a query to a malicious DNS server, or using the port randomization weakness, and might lead to a Denial of Service. Workaround ========== Port randomization can be enabled by setting the "query_port_start" option to 1024 which would resolve the CVE-2008-1447 issue. Resolution ========== All pdnsd users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/pdnsd-1.2.7" References ========== [ 1 ] CVE-2008-1447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 [ 2 ] CVE-2008-4194 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4194 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200901-03.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. License ======= Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2008-0014 Synopsis: Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues. Issue date: 2008-08-29 Updated on: 2008-08-29 (initial release of advisory) CVE numbers: CVE-2008-2101 CVE-2007-5269 CVE-2008-1447 CVE-2008-3691 CVE-2008-3692 CVE-2008-3693 CVE-2008-3694 CVE-2008-3695 CVE-2007-5438 CVE-2008-3696 CVE-2008-3697 CVE-2008-3698 CVE-2008-1806 CVE-2008-1807 CVE-2008-1808 CVE-2007-5503 - -------------------------------------------------------------------------- 1. Summary Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues. 2. Relevant releases VMware Workstation 6.0.4 and earlier, VMware Workstation 5.5.7 and earlier, VMware Player 2.0.4 and earlier, VMware Player 1.0.7 and earlier, VMware ACE 2.0.4 and earlier, VMware ACE 1.0.6 and earlier, VMware Server 1.0.6 and earlier, VMware ESX 3.0.3 without patches ESX303-200808404-SG, ESX303-200808403-SG ESX303-200808406-SG. VMware ESX 3.0.2 without patches ESX-1005109, ESX-1005113, ESX-1005114. VMware ESX 3.0.1 without patches ESX-1005108, ESX-1005112, ESX-1005111, ESX-1004823, ESX-1005117. NOTE: Hosted products VMware Workstation 5.x, VMware Player 1.x, and VMware ACE 1.x will reach end of general support 2008-11-09. Customers should plan to upgrade to the latest version of their respective products. Extended support (Security and Bug fixes) for ESX 3.0.2 ends on 10/29/2008 and Extended support for ESX 3.0.2 Update 1 ends on 8/8/2009. Users should plan to upgrade to ESX 3.0.3 and preferably to the newest release available. Extended Support (Security and Bug fixes) for ESX 3.0.1 has ended on 2008-07-31. The 3.0.1 patches are released in August because there was no patch release in July. 3. Problem Description I Security Issues a. Setting ActiveX killbit Starting from this release, VMware has set the killbit on its ActiveX controls. Setting the killbit ensures that ActiveX controls cannot run in Internet Explorer (IE), and avoids security issues involving ActiveX controls in IE. See the Microsoft KB article 240797 and the related references on this topic. Security vulnerabilities have been reported for ActiveX controls provided by VMware when run in IE. Under specific circumstances, exploitation of these ActiveX controls might result in denial-of- service or can allow running of arbitrary code when the user browses a malicious Web site or opens a malicious file in IE browser. An attempt to run unsafe ActiveX controls in IE might result in pop-up windows warning the user. Note: IE can be configured to run unsafe ActiveX controls without prompting. VMware recommends that you retain the default settings in IE, which prompts when unsafe actions are requested. Earlier, VMware had issued knowledge base articles, KB 5965318 and KB 9078920 on security issues with ActiveX controls. To avoid malicious scripts that exploit ActiveX controls, do not enable unsafe ActiveX objects in your browser settings. As a best practice, do not browse untrusted Web sites as an administrator and do not click OK or Yes if prompted by IE to allow certain actions. VMware would like to thank Julien Bachmann, Shennan Wang, Shinnai, and Michal Bucko for reporting these issues to us. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, CVE-2007-5438, and CVE-2008-3696 to the security issues with VMware ActiveX controls. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows 6.0.5 build 109488 or later Workstation 6.x Linux not affected Workstation 5.x Windows 5.5.8 build 108000 or later Workstation 5.x Linux not affected Player 2.x Windows 2.0.5 build 109488 or later Player 2.x Linux not affected Player 1.x Windows 1.0.8 build or later Player 1.x Linux not affected ACE 2.x Windows 2.0.5 build 109488 or later ACE 1.x Windows 1.0.7 build 108880 or later Server 1.x Windows 1.0.7 build 108231 or later Server 1.x Linux not affected Fusion 1.x Mac OS/X not affected ESXi 3.5 ESXi not affected ESX any ESX not affected b. VMware ISAPI Extension Denial of Service The Internet Server Application Programming Interface (ISAPI) is an API that extends the functionality of Internet Information Server (IIS). VMware uses ISAPI extensions in its Server product. One of the ISAPI extensions provided by VMware is vulnerable to a remote denial of service. By sending a malformed request, IIS might shut down. IIS 6.0 restarts automatically. However, IIS 5.0 does not restart automatically when its Startup Type is set to Manual. VMware would like to thank the Juniper Networks J-Security Security Research Team for reporting this issue to us. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2008-3697 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows not affected Workstation 6.x Linux not affected Workstation 5.x Windows not affected Workstation 5.x Linux not affected Player 2.x Windows not affected Player 2.x Linux not affected Player 1.x Windows not affected Player 1.x Linux not affected ACE 2.x Windows not affected ACE 1.x Windows not affected Server 1.x Windows 1.0.7 build 108231 or later Server 1.x Linux not affected Fusion 1.x Mac OS/X not affected ESXi 3.5 ESXi not affected ESX any ESX not affected c. OpenProcess Local Privilege Escalation on Host System This release fixes a privilege escalation vulnerability in host systems. Exploitation of this vulnerability allows users to run arbitrary code on the host system with elevated privileges. VMware would like to thank Sun Bing from McAfee, Inc. for reporting this issue to us. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2008-3698 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows not affected Workstation 6.x Linux not affected Workstation 5.x Windows 5.5.8 build 108000 or later Workstation 5.x Linux not affected Player 2.x Windows not affected Player 2.x Linux not affected Player 1.x Windows 1.0.8 build 109488 or later Player 1.x Linux not affected ACE 2.x Windows not affected ACE 1.x Windows 1.0.7 build 108880 or later Server 1.x Windows 1.0.7 build 108231 or later Server 1.x Linux not affected Fusion 1.x Mac OS/X not affected ESXi 3.5 ESXi not affected ESX any ESX not affected d. Update to Freetype FreeType 2.3.6 resolves an integer overflow vulnerability and other vulnerabilities that can allow malicious users to run arbitrary code or might cause a denial-of-service after reading a maliciously crafted file. This release updates FreeType to 2.3.7. The Common Vulnerabilities and Exposures Project (cve.mitre.com) has assigned the names CVE-2008-1806, CVE-2008-1807, and CVE-2008-1808 to the issues resolved in Freetype 2.3.6. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows not affected Workstation 6.x Linux 6.0.5 build 109488 or later Workstation 5.x Windows not affected Workstation 5.x Linux 5.5.8 build 108000 or later Player 2.x Windows not affected Player 2.x Linux 2.0.5 build 109488 or later Player 1.x Windows not affected Player 1.x Linux 1.0.8 build 108000 or later ACE 2.x Windows not affected ACE 1.x Windows not affected Server 1.x Windows not affected Server 1.x Linux 1.0.7 build 108231 or later Fusion 1.x Mac OS/X affected, patch pending ESXi 3.5 ESXi not affected ESX 3.5 ESX not affected ESX 3.0.3 ESX not affected ESX 3.0.2 ESX not affected ESX 3.0.1 ESX not affected ESX 2.5.5 ESX affected, patch pending ESX 2.5.4 ESX affected, patch pending e. Update to Cairo Cairo 1.4.12 resolves an integer overflow vulnerability that can allow malicious users to run arbitrary code or might cause a denial-of-service after reading a maliciously crafted PNG file. This release updates Cairo to 1.4.14. The Common Vulnerabilities and Exposures (cve.mitre.com) has assigned the name CVE-2007-5503 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 6.x Windows not affected Workstation 6.x Linux 6.0.5 build 109488 or later Workstation 5.x Windows not affected Workstation 5.x Linux not affected Player 2.x Windows not affected Player 2.x Linux 2.0.5 build 109488 or later Player 1.x Windows not affected Player 1.x Linux not affected ACE 2.x Windows not affected ACE 1.x Windows not affected Server 1.x Windows not affected Server 1.x Linux not affected Fusion 1.x Mac OS/X affected, patch pending ESXi 3.5 ESXi not affected ESX any ESX not affected f. VMware Consolidated Backup(VCB) command-line utilities may expose sensitive information VMware Consolidated Backup command-line utilities accept the user password through the -p command-line option. Users logged into the service console could gain access to the username and password used by VCB command-line utilities when such commands are running. This patch resolves this issue by providing an alternative way of passing the password used by VCB command-line utilities. The following options are recommended for passing the password: 1. The password is specified in /etc/backuptools.conf (PASSWORD=xxxxx), and -p is not used in the command line. /etc/backuptools.conf file permissions are read/write only for root. 2. No password is specified in /etc/backuptools.conf and the -p option is not used in the command line. The user will be prompted to enter a password. ESX is not affected unless you use VCB. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-2101 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= =================== VirtualCenter any Windows not affected hosted * any any not affected ESXi 3.5 ESXi not affected ESX 3.5 ESX ESX350-200806203-UG ESX 3.0.3 ESX ESX303-200808403-SG ESX 3.0.2 ESX ESX-1004824 ESX 3.0.1 ESX ESX-1004823 ESX 2.5.5 ESX not affected ESX 2.5.4 ESX not affected * hosted products are VMware Workstation, Player, ACE, Server, Fusion g. Third Party Library libpng Updated to 1.2.29 Several flaws were discovered in the way third party library libpng handled various PNG image chunks. An attacker could create a carefully crafted PNG image file in such a way that it causes an application linked with libpng to crash when the file is manipulated. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-5269 to this issue. NOTE: There are multiple patches required to remediate the issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= =================== VirtualCenter any Windows not affected hosted * any any not affected ESXi 3.5 ESXi affected, patch pending ESX 3.5 ESX affected, patch pending ESX 3.0.3 ESX ESX303-200808404-SG ESX303-200808403-SG ESX 3.0.2 ESX ESX-1005109 ESX-1005114 ESX-1005113 ESX 3.0.1 ESX ESX-1005112 ESX-1005108 ESX-1005111 ESX 2.5.5 ESX affected, patch pending ESX 2.5.4 ESX affected, patch pending * hosted products are VMware Workstation, Player, ACE, Server, Fusion II ESX Service Console rpm updates a. update to bind This update upgrades the service console rpms for bind-utils and bind-lib to version 9.2.4-22.el3. Version 9.2.4.-22.el3 addresses the recently discovered vulnerability in the BIND software used for Domain Name resolution (DNS). VMware doesn't install all the BIND packages on ESX Server and is not vulnerable by default to the reported vulnerability. Of the BIND packages, VMware only ships bind-util and bind-lib in the service console and these components by themselves cannot be used to setup a DNS server. Bind-lib and bind-util are used in client DNS applications like nsupdate, nslookup, etc. VMware explicitly discourages installing applications like BIND on the service console. In case the customer has installed BIND, and the DNS server is configured to support recursive queries, their ESX Server system is affected and they should replace BIND with a patched version. Note: ESX Server will use the DNS server on the network it is on, so it is important to patch that DNS server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-1447 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= =================== VirtualCenter any Windows not affected hosted * any any not affected ESXi 3.5 ESXi not affected ESX 3.5 ESX patch pending ESX 3.0.3 ESX ESX303-200808406-SG ESX 3.0.2 ESX ESX-1006356 ESX 3.0.1 ESX ESX-1005117 ESX 2.5.5 ESX patch pending ESX 2.5.4 ESX patch pending * hosted products are VMware Workstation, Player, ACE, Server, Fusion 4. Solution Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file. VMware Workstation 6.0.5 ------------------------ http://www.vmware.com/download/ws/ Release notes: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Windows binary md5sum: 46b4c54f0493f59f52ac6c2965296859 RPM Installation file for 32-bit Linux md5sum: 49ebfbd05d146ecc43262622ab746f03 tar Installation file for 32-bit Linux md5sum: 14ac93bffeee72528629d4caecc5ef37 RPM Installation file for 64-bit Linux md5sum: 0a856f1a1a31ba3c4b08bcf85d97ccf6 tar Installation file for 64-bit Linux md5sum: 3b459254069d663e9873a661bc97cf6c VMware Workstation 5.5.8 ------------------------ http://www.vmware.com/download/ws/ws5.html Release notes: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Windows binary: md5sum: 745c3250e5254eaf6e65fcfc4172070f Compressed Tar archive for 32-bit Linux md5sum: 65a454749d15d4863401619d7ff5566e Linux RPM version for 32-bit Linux md5sum: d80adc73b1500bdb0cb24d1b0733bcff VMware Player 2.0.5 and 1.0.8 ----------------------------- http://www.vmware.com/download/player/ Release notes Player 1.x: http://www.vmware.com/support/player/doc/releasenotes_player.html Release notes Player 2.0 http://www.vmware.com/support/player2/doc/releasenotes_player2.html 2.0.5 Windows binary md5sum: 60265438047259b23ff82fdfe737f969 VMware Player 2.0.5 for Linux (.rpm) md5sum: 3bc81e203e947e6ca5b55b3f33443d34 VMware Player 2.0.5 for Linux (.tar) md5sum: f499603d790edc5aa355e45b9c5eae01 VMware Player 2.0.5 - 64-bit (.rpm) md5sum: 85bc2f11d06c362feeff1a64ee5a6834 VMware Player 2.0.5 - 64-bit (.tar) md5sum: b74460bb961e88817884c7e2c0f30215 1.0.8 Windows binary md5sum: e5f927304925297a7d869f74b7b9b053 Player 1.0.8 for Linux (.rpm) md5sum: a13fdb8d72b661cefd24e7dcf6e2a990 Player 1.0.8 for Linux (.tar) md5sum: 99fbe861253eec5308d8c47938e8ad1e VMware ACE 2.0.5 ---------------- http://www.vmware.com/download/ace/ Release notes 2.0: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html ACE Manager Server Virtual Appliance Virtual Appliance for the ACE Management Server md5sum: 41e7349f3b6568dffa23055bb629208d ACE for Window 32-bit and 64-bit Main installation file for Windows 32-bit and 64-bit host (ACE Option Page key required for enabling ACE authoring) md5sum:46b4c54f0493f59f52ac6c2965296859 ACE Management Server for Windows ACE Management Server installation file for Windows md5sum:33a015c4b236329bcb7e12c82271c417 ACE Management Server for Red Hat Enterprise Linux 4 ACE Management Server installation file for Red Hat Enterprise Linux 4 md5sum:dc3bd89fd2285f41ed42f8b28cd5535f ACE Management Server for SUSE Enterprise Linux 9 ACE Management Server installation file for SUSE Enterprise Linux 9 md5sum:2add6a4fc97e1400fb2f94274ce0dce0 VMware ACE 1.0.7 ---------------- http://www.vmware.com/download/ace/ Release notes: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html md5sum: 42d806cddb8e9f905722aeac19740f33 VMware Server 1.0.7 ------------------- http://www.vmware.com/download/server/ Release notes: http://www.vmware.com/support/server/doc/releasenotes_server.html VMware Server for Windows 32-bit and 64-bit md5sum: 2e2ee5ebe08ae48eac5e661cad01acf6 VMware Server Windows client package md5sum: ce7d906a5a8de37cbc20db4332de1adb VMware Server for Linux md5sum: 04f201122b16222cd58fc81ca814ff8c VMware Server for Linux rpm md5sum: 6bae706df040c35851823bc087597d8d Management Interface md5sum: e67489bd2f23bcd4a323d19df4e903e8 VMware Server Linux client package md5sum: 99f1107302111ffd3f766194a33d492b ESX --- ESX 3.5.0 patch ESX350-200806203-UG (VCB) http://download3.vmware.com/software/esx/ESX350-200806203-UG.zip md5sum: 3bd512dc8aa2b276f7cfd19080d193c9 http://kb.vmware.com/kb/1005896 ESX 3.0.3 patch ESX303-200808403-SG (libpng) http://download3.vmware.com/software/vi/ESX303-200808403-SG.zip md5sum: 5f1e75631e53c0e9e013acdbe657cfc7 http://kb.vmware.com/kb/1006034 ESX 3.0.3 patch ESX303-200808404-SG (libpng) http://download3.vmware.com/software/vi/ESX303-200808404-SG.zip md5sum: 65468a5b6ba105cfde1dd444d77b2df4 http://kb.vmware.com/kb/1006035 ESX 3.0.3 patch ESX303-200808406-SG (bind) http://download3.vmware.com/software/vi/ESX303-200808406-SG.zip md5sum: a11273e8d430e5784071caff673995f4 http://kb.vmware.com/kb/1006357 ESX 3.0.3 patch (VCB) ESX 3.0.2 patch ESX-1005109 (libpng) http://download3.vmware.com/software/vi/ESX-1005109.tgz md5sum: 456d74d94317f852024aed5d3852be09 http://kb.vmware.com/kb/1005109 ESX 3.0.2 patch ESX-1005113 (libpng) http://download3.vmware.com/software/vi/ESX-1005113.tgz md5sum: 5d604f2bfd90585b9c8679f5fc8c31b7 http://kb.vmware.com/kb/1005113 ESX 3.0.2 patch ESX-1005114 (libpng) http://download3.vmware.com/software/vi/ESX-1005114.tgz md5sum: 3b6d33b334f0020131580fdd8f9b5365 http://kb.vmware.com/kb/1005114 ESX 3.0.2 patch ESX-1004824 (VCB) http://download3.vmware.com/software/vi/ESX-1004824.tgz md5sum: c72b0132c9f5d7b4cb1b9e47748a9c5b http://kb.vmware.com/kb/1004824 ESX 3.0.2 patch ESX-1006356 (bind) http://download3.vmware.com/software/vi/ESX-1006356.tgz md5sum: f0bc9d0b641954145df3986cdb1c2bab http://kb.vmware.com/kb/1006356 ESX 3.0.1 patch ESX-1005111 (libpng) http://download3.vmware.com/software/vi/ESX-1005111.tgz md5sum: 60e1be9b41070b3531c06f9a0595e24c http://kb.vmware.com/kb/1005111 ESX 3.0.1 patch ESX-1005112 (libpng) http://download3.vmware.com/software/vi/ESX-1005112.tgz md5sum: ad645cef0f9fa18bb648ba5a37074732 http://kb.vmware.com/kb/1005112 ESX 3.0.1 patch ESX-1005108 (libpng) http://download3.vmware.com/software/vi/ESX-1005108.tgz md5sum: aabc873d978f023c929ccd9a54588ea5 http://kb.vmware.com/kb/1005108 ESX 3.0.1 patch ESX-1004823 (VCB) http://download3.vmware.com/software/vi/ESX-1004823.tgz md5sum: 5ff2e8ce50c18afca76fb16c28415a59 http://kb.vmware.com/kb/1004823 ESX 3.0.1 patch ESX-1005117 (bind) http://download3.vmware.com/software/vi/ESX-1005117.tgz md5sum: 5271ecc6e36fb6f1fdf372e57891aa33 http://kb.vmware.com/kb/1005117 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2101 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3693 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3694 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3695 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5438 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3696 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3697 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3698 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503 - ------------------------------------------------------------------------ 6. Change log 2008-08-29 VMSA-2008-0014 initial release - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Center http://www.vmware.com/security VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2008 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFIuI98S2KysvBH1xkRCJp7AJ9Mq0+CEdoQRLzPLSRbv5OLqXqUHACfUSRt bZpHL8qHcNwAiTVz6P3+W6E= =PQ58 -----END PGP SIGNATURE----- . Release Date: 2008-07-16 Last Updated: 2008-08-06 Potential Security Impact: Remote DNS cache poisoning Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running BIND. References: CVE-2008-1447 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running BIND v9.3.2 or BIND v9.2.0, HP-UX B.11.11 running BIND v8.1.2 BACKGROUND CVSS 2.0 Base Metrics =============================================== Reference Base Vector Base Score CVE-2008-1447 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =============================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. Customers running BIND v8.1.2 on HP-UX B.11.11 should upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below. The BIND v9.2.0 update is available for download from: ftp://ss080058:ss080058@hprc.external.hp.com The patch PHNE_37865 is available from: http://itrc.hp.com The BIND v9.3.2 updates are available for download from: http://software.hp.com HP-UX Release - B.11.11 running v8.1.2 Action - Upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below HP-UX Release - B.11.11 running v9.2.0 BIND Depot name - BIND920v11.depot MD5 Sum - F6999280DE19645EF86FF52083AACD72 HP-UX Release - B.11.23 running v9.2.0 Action - Install PHNE_37865 HP-UX Release - B.11.11 running v9.3.2 Action - Install revision C.9.3.2.3.0 or subsequent HP-UX Release - B.11.23 running v9.3.2 Action - Install revision C.9.3.2.3.0 or subsequent HP-UX Release - B.11.31 running v9.3.2 Action - Install revision C.9.3.2.3.0 or subsequent Note: HP is aware of performance issues with these updates / patch. All customers should test the updates / patch in their environment. HP is investigating changes to reduce the performance issues. This bulletin will be revised when new updates / patch become available. MANUAL ACTIONS: Yes - NonUpdate For B.11.11 running v8.1.2, upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates For B.11.11 running v9.2.0 install BIND920v11.depot PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa AFFECTED VERSIONS For BIND v8.1.2 HP-UX B.11.11 ============= InternetSrvcs.INETSVCS-RUN action: upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates For BIND v9.3.2 HP-UX B.11.11 ============= BindUpgrade.BIND-UPGRADE action: install revision C.9.3.2.3.0 or subsequent URL: http://software.hp.com HP-UX B.11.23 ============= BindUpgrade.BIND-UPGRADE BindUpgrade.BIND2-UPGRADE action: install revision C.9.3.2.3.0 or subsequent URL: http://software.hp.com HP-UX B.11.31 ============= NameService.BIND-AUX NameService.BIND-RUN action: install revision C.9.3.2.3.0 or subsequent URL: http://software.hp.com For BIND v9.2.0 HP-UX B.11.11 ============= BINDv920.INETSVCS-BIND action: install revision B.11.11.01.011 or subsequent URL: ftp://ss080058:ss080058@hprc.external.hp.com HP-UX B.11.23 ============= InternetSrvcs.INETSVCS-INETD InternetSrvcs.INETSVCS-RUN InternetSrvcs.INETSVCS2-RUN action: install patch PHNE_37865 or subsequent URL: http://itrc.hp.com END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 16 July 2008 Initial release Version:2 (rev.2) - 19 July 2008 Added BIND v9.2.0 depot information Version:3 (rev.3) - 06 August 2008 Updated patch location, revised BIND v9.2.0 depot information, added BIND v8.1.2 Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." \xa9Copyright 2008 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. HP TCP/IP Services for OpenVMS 5.7 ECO5 package is available from the following location: The HP TCP/IP Services for OpenVMS 5.7 ECO5 kits for both Integrity and Alpha platforms have been uploaded to HP Support Center website. Description =========== == Several vulnerabilities in safe level == Multiple errors in the implementation of safe level restrictions can be exploited to call "untrace_var()", perform syslog operations, and modify "$PROGRAM_NAME" at safe level 4, or call insecure methods at safe levels 1 through 3. (These vulnerabilities were reported by Keita Yamaguchi.) == DoS vulnerability in WEBrick == An error exists in the usage of regular expressions in "WEBrick::HTTPUtils.split_header_value()". This can be exploited to consume large amounts of CPU via a specially crafted HTTP request. (This vulnerability was reported by Christian Neukirchen.) == Lack of taintness check in dl == An error in "DL" can be exploited to bypass security restrictions and call potentially dangerous functions. (This vulnerability was reported by Tanaka Akira.) Affected packages: Pardus 2008: ruby, all before 1.8.7_p72-16-4 ruby-mode, all before 1.8.7_p72-16-4 Pardus 2007: ruby, all before 1.8.7_p72-16-13 ruby-mode, all before 1.8.7_p72-16-4 Resolution ========== There are update(s) for ruby, ruby-mode. You can update them via Package Manager or with a single command from console: Pardus 2008: pisi up ruby ruby-mode Pardus 2007: pisi up ruby ruby-mode References ========== * http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 * http://secunia.com/advisories/31430/ ------------------------------------------------------------------------ -- Pınar Yanardağ http://pinguar.org _______________________________________________ Full-Disclosure - We believe in it. Dan Kaminsky identified a practical vector of DNS response spoofing and cache poisoning, exploiting the limited entropy in a DNS transaction ID and lack of UDP source port randomization in many DNS implementations. Scott Kitterman noted that python-dns is vulnerable to this predictability, as it randomizes neither its transaction ID nor its source port. Taken together, this lack of entropy leaves applications using python-dns to perform DNS queries highly susceptible to response forgery. For the stable distribution (etch), these problems have been fixed in version 2.3.0-5.2+etch1. We recommend that you upgrade your python-dns package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - ------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz Size/MD5 checksum: 21084 82d377c6a59181072b30b0da4e9835b8 http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.diff.gz Size/MD5 checksum: 3444 06a021e1cf9836cec4bbe72461bab137 http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.dsc Size/MD5 checksum: 695 c2e7178128b7033952b7795b358dea0b Architecture independent packages: http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1_all.deb Size/MD5 checksum: 22750 b544ce3edb7d2051811ec743a49206a1 These files will probably be moved into the stable distribution on its next update. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Red Hat update for bind SECUNIA ADVISORY ID: SA26195 VERIFY ADVISORY: http://secunia.com/advisories/26195/ CRITICAL: Moderately critical IMPACT: Spoofing WHERE: >From remote OPERATING SYSTEM: Red Hat Enterprise Linux (v. 5 server) http://secunia.com/product/13652/ Red Hat Enterprise Linux Desktop (v. 5 client) http://secunia.com/product/13653/ Red Hat Enterprise Linux Desktop Workstation (v. 5 client) http://secunia.com/product/13651/ RedHat Enterprise Linux AS 2.1 http://secunia.com/product/48/ RedHat Enterprise Linux AS 3 http://secunia.com/product/2534/ RedHat Enterprise Linux AS 4 http://secunia.com/product/4669/ RedHat Enterprise Linux ES 2.1 http://secunia.com/product/1306/ RedHat Enterprise Linux ES 3 http://secunia.com/product/2535/ RedHat Enterprise Linux ES 4 http://secunia.com/product/4668/ RedHat Enterprise Linux WS 3 http://secunia.com/product/2536/ RedHat Enterprise Linux WS 2.1 http://secunia.com/product/1044/ RedHat Enterprise Linux WS 4 http://secunia.com/product/4670/ RedHat Linux Advanced Workstation 2.1 for Itanium http://secunia.com/product/1326/ DESCRIPTION: Red Hat has issued an update for bind. For more information: SA26152 SOLUTION: Updated packages are available from Red Hat Network. http://rhn.redhat.com ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2007-0740.html OTHER REFERENCES: SA26152: http://secunia.com/advisories/26152/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Security Advisory (08-AUG-2008) (CVE-2008-3280) =============================================== Ben Laurie of Google's Applied Security team, while working with an external researcher, Dr. Richard Clayton of the Computer Laboratory, Cambridge University, found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs. Attack Description ------------------ In order to mount an attack against a vulnerable OP, the attacker first finds the private key corresponding to the weak TLS certificate. He then sets up a website masquerading as the original OP, both for the OpenID protocol and also for HTTP/HTTPS. Then he poisons the DNS cache of the victim to make it appear that his server is the true OpenID Provider. There are two cases, one is where the victim is a user trying to identify themselves, in which case, even if they use HTTPS to "ensure" that the site they are visiting is indeed their provider, they will be unable to detect the substitution and will give their login credentials to the attacker. The second case is where the victim is the Relying Party (RP). In this case, even if the RP uses TLS to connect to the OP, as is recommended for higher assurance, he will not be defended, as the vast majority of OpenID implementations do not check CRLs, and will, therefore, accept the malicious site as the true OP. Mitigation ---------- Mitigation is surprisingly hard. In theory the vulnerable site should revoke their weak certificate and issue a new one. However, since the CRLs will almost certainly not be checked, this means the site will still be vulnerable to attack for the lifetime of the certificate (and perhaps beyond, depending on user behaviour). Note that shutting down the site DOES NOT prevent the attack. Therefore mitigation falls to other parties. Browsers must check CRLs by default. OpenID libraries must check CRLs. Until either 1 and 2 or 3 have been done, OpenID cannot be trusted for any OP that cannot demonstrate it has never had a weak certificate. Discussion ---------- Normally, when security problems are encountered with a single piece of software, the responsible thing to do is to is to wait until fixes are available before making any announcement. However, as a number of examples in the past have demonstrated, this approach does not work particularly well when many different pieces of software are involved because it is necessary to coordinate a simultaneous release of the fixes, whilst hoping that the very large number of people involved will cooperate in keeping the vulnerability secret. In the present situation, the fixes will involve considerable development work in adding CRL handling to a great many pieces of openID code. This is a far from trivial amount of work. The fixes will also involve changes to browser preferences to ensure that CRLs are checked by default -- which many vendors have resisted for years. We are extremely pessimistic that a security vulnerability in OpenID will be seen as sufficiently important to change the browser vendors minds. Hence, we see no value in delaying this announcement; and by making the details public as soon as possible, we believe that individuals who rely on OpenID will be better able to take their own individual steps to avoid relying upon the flawed certificates we have identified. OpenID is at heart quite a weak protocol, when used in its most general form[1], and consequently there is very limited reliance upon its security. This means that the consequences of the combination of attacks that are now possible is nothing like as serious as might otherwise have been the case. However, it does give an insight into the type of security disaster that may occur in the future if we do not start to take CRLs seriously, but merely stick them onto "to-do" lists or disable them in the name of tiny performance improvements. Affected Sites -------------- There is no central registry of OpenID systems, and so we cannot be sure that we have identified all of the weak certificates that are currently being served. The list of those we have found so far is: openid.sun.com www.xopenid.net openid.net.nz Notes ----- [1] There are ways of using OpenID that are significantly more secure than the commonly deployed scheme, I shall describe those in a separate article. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 3.33

sources: NVD: CVE-2008-1447 // CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // PACKETSTORM: 74443 // PACKETSTORM: 68412 // PACKETSTORM: 73732 // PACKETSTORM: 69536 // PACKETSTORM: 68878 // PACKETSTORM: 129616 // PACKETSTORM: 69021 // PACKETSTORM: 68546 // PACKETSTORM: 58035 // PACKETSTORM: 68924

AFFECTED PRODUCTS

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:fujitsumodel: - scope: - version: -

Trust: 1.6

vendor:internet consortiummodel: - scope: - version: -

Trust: 1.6

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:red hatmodel: - scope: - version: -

Trust: 1.6

vendor:suse linuxmodel: - scope: - version: -

Trust: 1.6

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 1.6

vendor:ubuntumodel: - scope: - version: -

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:4

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.2.9

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:8

Trust: 1.0

vendor:alcatel lucentmodel: - scope: - version: -

Trust: 0.8

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:bluecatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:force10model: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:funkwerkmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:infobloxmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:nixumodel: - scope: - version: -

Trust: 0.8

vendor:nominummodel: - scope: - version: -

Trust: 0.8

vendor:nortelmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:qnxmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:wind rivermodel: - scope: - version: -

Trust: 0.8

vendor:yamahamodel: - scope: - version: -

Trust: 0.8

vendor:dnsmasqmodel: - scope: - version: -

Trust: 0.8

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // NVD: CVE-2008-1447

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1447
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#800113
value: 27.54

Trust: 0.8

CARNEGIE MELLON: VU#252735
value: 3.83

Trust: 0.8

VULHUB: VHN-31572
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-31572
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // NVD: CVE-2008-1447

PROBLEMTYPE DATA

problemtype:CWE-331

Trust: 1.1

problemtype:CWE-310

Trust: 0.1

sources: VULHUB: VHN-31572 // NVD: CVE-2008-1447

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 68412

TYPE

spoof

Trust: 0.3

sources: PACKETSTORM: 68412 // PACKETSTORM: 69021 // PACKETSTORM: 68546

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-31572

EXTERNAL IDS

db:NVDid:CVE-2008-1447

Trust: 2.0

db:CERT/CCid:VU#800113

Trust: 1.9

db:SECUNIAid:31430

Trust: 1.2

db:VUPENid:ADV-2008-2025

Trust: 1.1

db:VUPENid:ADV-2009-0297

Trust: 1.1

db:VUPENid:ADV-2008-2334

Trust: 1.1

db:VUPENid:ADV-2008-2383

Trust: 1.1

db:VUPENid:ADV-2008-2113

Trust: 1.1

db:VUPENid:ADV-2008-2558

Trust: 1.1

db:VUPENid:ADV-2008-2019

Trust: 1.1

db:VUPENid:ADV-2008-2377

Trust: 1.1

db:VUPENid:ADV-2008-2584

Trust: 1.1

db:VUPENid:ADV-2008-2342

Trust: 1.1

db:VUPENid:ADV-2010-0622

Trust: 1.1

db:VUPENid:ADV-2008-2166

Trust: 1.1

db:VUPENid:ADV-2008-2051

Trust: 1.1

db:VUPENid:ADV-2008-2092

Trust: 1.1

db:VUPENid:ADV-2008-2029

Trust: 1.1

db:VUPENid:ADV-2008-2384

Trust: 1.1

db:VUPENid:ADV-2008-2268

Trust: 1.1

db:VUPENid:ADV-2008-2052

Trust: 1.1

db:VUPENid:ADV-2008-2549

Trust: 1.1

db:VUPENid:ADV-2008-2197

Trust: 1.1

db:VUPENid:ADV-2009-0311

Trust: 1.1

db:VUPENid:ADV-2008-2055

Trust: 1.1

db:VUPENid:ADV-2008-2467

Trust: 1.1

db:VUPENid:ADV-2008-2123

Trust: 1.1

db:VUPENid:ADV-2008-2482

Trust: 1.1

db:VUPENid:ADV-2008-2525

Trust: 1.1

db:VUPENid:ADV-2008-2023

Trust: 1.1

db:VUPENid:ADV-2008-2582

Trust: 1.1

db:VUPENid:ADV-2008-2114

Trust: 1.1

db:VUPENid:ADV-2008-2196

Trust: 1.1

db:VUPENid:ADV-2008-2139

Trust: 1.1

db:VUPENid:ADV-2008-2466

Trust: 1.1

db:VUPENid:ADV-2008-2050

Trust: 1.1

db:VUPENid:ADV-2008-2195

Trust: 1.1

db:VUPENid:ADV-2008-2291

Trust: 1.1

db:VUPENid:ADV-2008-2030

Trust: 1.1

db:SECTRACKid:1020548

Trust: 1.1

db:SECTRACKid:1020578

Trust: 1.1

db:SECTRACKid:1020448

Trust: 1.1

db:SECTRACKid:1020558

Trust: 1.1

db:SECTRACKid:1020702

Trust: 1.1

db:SECTRACKid:1020440

Trust: 1.1

db:SECTRACKid:1020575

Trust: 1.1

db:SECTRACKid:1020437

Trust: 1.1

db:SECTRACKid:1020802

Trust: 1.1

db:SECTRACKid:1020449

Trust: 1.1

db:SECTRACKid:1020579

Trust: 1.1

db:SECTRACKid:1020561

Trust: 1.1

db:SECTRACKid:1020804

Trust: 1.1

db:SECTRACKid:1020577

Trust: 1.1

db:SECTRACKid:1020560

Trust: 1.1

db:SECTRACKid:1020651

Trust: 1.1

db:SECTRACKid:1020653

Trust: 1.1

db:SECTRACKid:1020438

Trust: 1.1

db:SECTRACKid:1020576

Trust: 1.1

db:SECUNIAid:31209

Trust: 1.1

db:SECUNIAid:31197

Trust: 1.1

db:SECUNIAid:31422

Trust: 1.1

db:SECUNIAid:30977

Trust: 1.1

db:SECUNIAid:31151

Trust: 1.1

db:SECUNIAid:31354

Trust: 1.1

db:SECUNIAid:31093

Trust: 1.1

db:SECUNIAid:31212

Trust: 1.1

db:SECUNIAid:31207

Trust: 1.1

db:SECUNIAid:31221

Trust: 1.1

db:SECUNIAid:31254

Trust: 1.1

db:SECUNIAid:31451

Trust: 1.1

db:SECUNIAid:31169

Trust: 1.1

db:SECUNIAid:30988

Trust: 1.1

db:SECUNIAid:30973

Trust: 1.1

db:SECUNIAid:31687

Trust: 1.1

db:SECUNIAid:31199

Trust: 1.1

db:SECUNIAid:30980

Trust: 1.1

db:SECUNIAid:31137

Trust: 1.1

db:SECUNIAid:30998

Trust: 1.1

db:SECUNIAid:31014

Trust: 1.1

db:SECUNIAid:31065

Trust: 1.1

db:SECUNIAid:31882

Trust: 1.1

db:SECUNIAid:31019

Trust: 1.1

db:SECUNIAid:31153

Trust: 1.1

db:SECUNIAid:31482

Trust: 1.1

db:SECUNIAid:31495

Trust: 1.1

db:SECUNIAid:33178

Trust: 1.1

db:SECUNIAid:33714

Trust: 1.1

db:SECUNIAid:31213

Trust: 1.1

db:SECUNIAid:31326

Trust: 1.1

db:SECUNIAid:31052

Trust: 1.1

db:SECUNIAid:31011

Trust: 1.1

db:SECUNIAid:31588

Trust: 1.1

db:SECUNIAid:31033

Trust: 1.1

db:SECUNIAid:31031

Trust: 1.1

db:SECUNIAid:30979

Trust: 1.1

db:SECUNIAid:31022

Trust: 1.1

db:SECUNIAid:31094

Trust: 1.1

db:SECUNIAid:31030

Trust: 1.1

db:SECUNIAid:31204

Trust: 1.1

db:SECUNIAid:30925

Trust: 1.1

db:SECUNIAid:31072

Trust: 1.1

db:SECUNIAid:31152

Trust: 1.1

db:SECUNIAid:31237

Trust: 1.1

db:SECUNIAid:31012

Trust: 1.1

db:SECUNIAid:33786

Trust: 1.1

db:SECUNIAid:31143

Trust: 1.1

db:SECUNIAid:31236

Trust: 1.1

db:SECUNIAid:31900

Trust: 1.1

db:SECUNIAid:30989

Trust: 1.1

db:SECUNIAid:31823

Trust: 1.1

db:USCERTid:TA08-190B

Trust: 1.1

db:USCERTid:TA08-260A

Trust: 1.1

db:USCERTid:TA08-190A

Trust: 1.1

db:BIDid:30131

Trust: 1.1

db:EXPLOIT-DBid:6130

Trust: 1.1

db:EXPLOIT-DBid:6123

Trust: 1.1

db:EXPLOIT-DBid:6122

Trust: 1.1

db:SECUNIAid:26195

Trust: 0.9

db:EXPLOIT-DBid:4266

Trust: 0.8

db:CERT/CCid:VU#252735

Trust: 0.8

db:PACKETSTORMid:68878

Trust: 0.2

db:PACKETSTORMid:68412

Trust: 0.2

db:PACKETSTORMid:74443

Trust: 0.2

db:PACKETSTORMid:73732

Trust: 0.2

db:PACKETSTORMid:68546

Trust: 0.2

db:PACKETSTORMid:68038

Trust: 0.1

db:PACKETSTORMid:68755

Trust: 0.1

db:PACKETSTORMid:68118

Trust: 0.1

db:PACKETSTORMid:73060

Trust: 0.1

db:PACKETSTORMid:68502

Trust: 0.1

db:PACKETSTORMid:68061

Trust: 0.1

db:PACKETSTORMid:68288

Trust: 0.1

db:PACKETSTORMid:96747

Trust: 0.1

db:PACKETSTORMid:94774

Trust: 0.1

db:PACKETSTORMid:68199

Trust: 0.1

db:PACKETSTORMid:68183

Trust: 0.1

db:PACKETSTORMid:68068

Trust: 0.1

db:PACKETSTORMid:68471

Trust: 0.1

db:PACKETSTORMid:70207

Trust: 0.1

db:PACKETSTORMid:68039

Trust: 0.1

db:PACKETSTORMid:68036

Trust: 0.1

db:PACKETSTORMid:68500

Trust: 0.1

db:PACKETSTORMid:68691

Trust: 0.1

db:PACKETSTORMid:68360

Trust: 0.1

db:PACKETSTORMid:68037

Trust: 0.1

db:PACKETSTORMid:68473

Trust: 0.1

db:PACKETSTORMid:68129

Trust: 0.1

db:PACKETSTORMid:68554

Trust: 0.1

db:PACKETSTORMid:68063

Trust: 0.1

db:PACKETSTORMid:68543

Trust: 0.1

db:SEEBUGid:SSVID-65607

Trust: 0.1

db:VULHUBid:VHN-31572

Trust: 0.1

db:PACKETSTORMid:69536

Trust: 0.1

db:PACKETSTORMid:129616

Trust: 0.1

db:PACKETSTORMid:69021

Trust: 0.1

db:PACKETSTORMid:58035

Trust: 0.1

db:PACKETSTORMid:68924

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // PACKETSTORM: 74443 // PACKETSTORM: 68412 // PACKETSTORM: 73732 // PACKETSTORM: 69536 // PACKETSTORM: 68878 // PACKETSTORM: 129616 // PACKETSTORM: 69021 // PACKETSTORM: 68546 // PACKETSTORM: 58035 // PACKETSTORM: 68924 // NVD: CVE-2008-1447

REFERENCES

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26667

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26668

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26669

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26670

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26671

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26672

Trust: 1.1

url:http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00004.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00005.html

Trust: 1.1

url:http://www.securityfocus.com/bid/30131

Trust: 1.1

url:http://www.securityfocus.com/archive/1/495289/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/495869/100/0/threaded

Trust: 1.1

url:http://www.us-cert.gov/cas/techalerts/ta08-190a.html

Trust: 1.1

url:http://www.us-cert.gov/cas/techalerts/ta08-190b.html

Trust: 1.1

url:http://www.us-cert.gov/cas/techalerts/ta08-260a.html

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/800113

Trust: 1.1

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00809c2168.shtml

Trust: 1.1

url:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401

Trust: 1.1

url:http://support.apple.com/kb/ht3026

Trust: 1.1

url:http://support.apple.com/kb/ht3129

Trust: 1.1

url:http://support.citrix.com/article/ctx117991

Trust: 1.1

url:http://support.citrix.com/article/ctx118183

Trust: 1.1

url:http://up2date.astaro.com/2008/08/up2date_7202_released.html

Trust: 1.1

url:http://wiki.rpath.com/wiki/advisories:rpsa-2008-0231

Trust: 1.1

url:http://wiki.rpath.com/wiki/advisories:rpsa-2010-0018

Trust: 1.1

url:http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning

Trust: 1.1

url:http://www.isc.org/index.pl?/sw/bind/bind-security.php

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/mimg-7dwr4j

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/mimg-7ecl8q

Trust: 1.1

url:http://www.novell.com/support/viewcontent.do?externalid=7000912

Trust: 1.1

url:http://www.phys.uu.nl/~rombouts/pdnsd.html

Trust: 1.1

url:http://www.phys.uu.nl/~rombouts/pdnsd/changelog

Trust: 1.1

url:http://www.rtpro.yamaha.co.jp/rt/faq/security/vu800113.html

Trust: 1.1

url:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2008-0014.html

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1603

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1604

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1605

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1619

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1623

Trust: 1.1

url:https://www.exploit-db.com/exploits/6122

Trust: 1.1

url:https://www.exploit-db.com/exploits/6123

Trust: 1.1

url:https://www.exploit-db.com/exploits/6130

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00402.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00458.html

Trust: 1.1

url:http://security.freebsd.org/advisories/freebsd-sa-08:06.bind.asc

Trust: 1.1

url:http://lists.grok.org.uk/pipermail/full-disclosure/2008-august/064118.html

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-200807-08.xml

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-200812-17.xml

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-201209-25.xml

Trust: 1.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01662368

Trust: 1.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01523520

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2008:139

Trust: 1.1

url:http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html

Trust: 1.1

url:http://www.caughq.org/exploits/cau-ex-2008-0002.txt

Trust: 1.1

url:http://www.caughq.org/exploits/cau-ex-2008-0003.txt

Trust: 1.1

url:http://www.doxpara.com/?p=1176

Trust: 1.1

url:http://www.doxpara.com/dmk_bo2k8.ppt

Trust: 1.1

url:http://www.nominum.com/asset_upload_file741_2661.pdf

Trust: 1.1

url:http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html

Trust: 1.1

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037

Trust: 1.1

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2008-009.txt.asc

Trust: 1.1

url:http://www.openbsd.org/errata42.html#013_bind

Trust: 1.1

url:http://www.openbsd.org/errata43.html#004_bind

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12117

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5725

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5761

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5917

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9627

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2008-0533.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2008-0789.html

Trust: 1.1

url:http://www.securitytracker.com/id?1020437

Trust: 1.1

url:http://www.securitytracker.com/id?1020438

Trust: 1.1

url:http://www.securitytracker.com/id?1020440

Trust: 1.1

url:http://www.securitytracker.com/id?1020448

Trust: 1.1

url:http://www.securitytracker.com/id?1020449

Trust: 1.1

url:http://www.securitytracker.com/id?1020548

Trust: 1.1

url:http://www.securitytracker.com/id?1020558

Trust: 1.1

url:http://www.securitytracker.com/id?1020560

Trust: 1.1

url:http://www.securitytracker.com/id?1020561

Trust: 1.1

url:http://www.securitytracker.com/id?1020575

Trust: 1.1

url:http://www.securitytracker.com/id?1020576

Trust: 1.1

url:http://www.securitytracker.com/id?1020577

Trust: 1.1

url:http://www.securitytracker.com/id?1020578

Trust: 1.1

url:http://www.securitytracker.com/id?1020579

Trust: 1.1

url:http://www.securitytracker.com/id?1020651

Trust: 1.1

url:http://www.securitytracker.com/id?1020653

Trust: 1.1

url:http://www.securitytracker.com/id?1020702

Trust: 1.1

url:http://www.securitytracker.com/id?1020802

Trust: 1.1

url:http://www.securitytracker.com/id?1020804

Trust: 1.1

url:http://secunia.com/advisories/30925

Trust: 1.1

url:http://secunia.com/advisories/30973

Trust: 1.1

url:http://secunia.com/advisories/30977

Trust: 1.1

url:http://secunia.com/advisories/30979

Trust: 1.1

url:http://secunia.com/advisories/30980

Trust: 1.1

url:http://secunia.com/advisories/30988

Trust: 1.1

url:http://secunia.com/advisories/30989

Trust: 1.1

url:http://secunia.com/advisories/30998

Trust: 1.1

url:http://secunia.com/advisories/31011

Trust: 1.1

url:http://secunia.com/advisories/31012

Trust: 1.1

url:http://secunia.com/advisories/31014

Trust: 1.1

url:http://secunia.com/advisories/31019

Trust: 1.1

url:http://secunia.com/advisories/31022

Trust: 1.1

url:http://secunia.com/advisories/31030

Trust: 1.1

url:http://secunia.com/advisories/31031

Trust: 1.1

url:http://secunia.com/advisories/31033

Trust: 1.1

url:http://secunia.com/advisories/31052

Trust: 1.1

url:http://secunia.com/advisories/31065

Trust: 1.1

url:http://secunia.com/advisories/31072

Trust: 1.1

url:http://secunia.com/advisories/31093

Trust: 1.1

url:http://secunia.com/advisories/31094

Trust: 1.1

url:http://secunia.com/advisories/31137

Trust: 1.1

url:http://secunia.com/advisories/31143

Trust: 1.1

url:http://secunia.com/advisories/31151

Trust: 1.1

url:http://secunia.com/advisories/31152

Trust: 1.1

url:http://secunia.com/advisories/31153

Trust: 1.1

url:http://secunia.com/advisories/31169

Trust: 1.1

url:http://secunia.com/advisories/31197

Trust: 1.1

url:http://secunia.com/advisories/31199

Trust: 1.1

url:http://secunia.com/advisories/31204

Trust: 1.1

url:http://secunia.com/advisories/31207

Trust: 1.1

url:http://secunia.com/advisories/31209

Trust: 1.1

url:http://secunia.com/advisories/31212

Trust: 1.1

url:http://secunia.com/advisories/31213

Trust: 1.1

url:http://secunia.com/advisories/31221

Trust: 1.1

url:http://secunia.com/advisories/31236

Trust: 1.1

url:http://secunia.com/advisories/31237

Trust: 1.1

url:http://secunia.com/advisories/31254

Trust: 1.1

url:http://secunia.com/advisories/31326

Trust: 1.1

url:http://secunia.com/advisories/31354

Trust: 1.1

url:http://secunia.com/advisories/31422

Trust: 1.1

url:http://secunia.com/advisories/31430

Trust: 1.1

url:http://secunia.com/advisories/31451

Trust: 1.1

url:http://secunia.com/advisories/31482

Trust: 1.1

url:http://secunia.com/advisories/31495

Trust: 1.1

url:http://secunia.com/advisories/31588

Trust: 1.1

url:http://secunia.com/advisories/31687

Trust: 1.1

url:http://secunia.com/advisories/31823

Trust: 1.1

url:http://secunia.com/advisories/31882

Trust: 1.1

url:http://secunia.com/advisories/31900

Trust: 1.1

url:http://secunia.com/advisories/33178

Trust: 1.1

url:http://secunia.com/advisories/33714

Trust: 1.1

url:http://secunia.com/advisories/33786

Trust: 1.1

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1

Trust: 1.1

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-622-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-627-1

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2019/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2023/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2025/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2029/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2030/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2050/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2051/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2052/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2055/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2092/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2113/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2114/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2123/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2139/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2166/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2195/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2196/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2197/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2268

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2291

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2334

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2342

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2377

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2383

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2384

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2466

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2467

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2482

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2525

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2549

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2558

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2582

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2584

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/0297

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/0311

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/0622

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43637

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43334

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=121630706004256&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=121866517322103&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=123324863916385&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141879471518471&w=2

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239

Trust: 1.0

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=762152

Trust: 1.0

url:http://www.ipcop.org/index.php?name=news&file=article&sid=40

Trust: 1.0

url:http://secunia.com/advisories/26195/

Trust: 0.9

url:http://csrc.nist.gov/publications/nistpubs/800-81/sp800-81.pdf

Trust: 0.8

url:http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience

Trust: 0.8

url:http://tools.ietf.org/html/rfc3833

Trust: 0.8

url:http://tools.ietf.org/html/rfc2827

Trust: 0.8

url:http://tools.ietf.org/html/rfc3704

Trust: 0.8

url:http://tools.ietf.org/html/rfc3013

Trust: 0.8

url:http://tools.ietf.org/html/rfc4033

Trust: 0.8

url:http://tools.ietf.org/html/draft-ietf-tsvwg-port-randomization

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_random.html

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_transmit.html

Trust: 0.8

url:http://cr.yp.to/djbdns/forgery.html

Trust: 0.8

url:http://www.trusteer.com/microsoftdns

Trust: 0.8

url:http://www.trusteer.com/bind9dns

Trust: 0.8

url:http://www.trusteer.com/bind8dns

Trust: 0.8

url:http://www.sans.org/reading_room/whitepapers/dns/1567.php

Trust: 0.8

url:http://blogs.iss.net/archive/morednsnat.html

Trust: 0.8

url:https://jvn.jp/cert/jvnvu800113/

Trust: 0.8

url:http://www.cert.at/static/cert.at-0802-dns-patchanalysis.pdf

Trust: 0.8

url:http://www.isc.org/sw/bind/bind-security.php

Trust: 0.8

url:http://www.trusteer.com/docs/bind9dns.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23252735/index.html

Trust: 0.8

url:http://www.milw0rm.com/exploits/4266

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=307041

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2008-1447

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1447

Trust: 0.3

url:http://secunia.com/

Trust: 0.3

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.3

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.2

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.2

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.2

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&amp;id=762152

Trust: 0.1

url:http://www.ipcop.org/index.php?name=news&amp;file=article&amp;sid=40

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=123324863916385&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=141879471518471&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121866517322103&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121630706004256&amp;w=2

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.539239

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.452680

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_i386.deb

Trust: 0.1

url:http://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4194

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200901-03.xml

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4194

Trust: 0.1

url:http://kb.vmware.com/kb/1006356

Trust: 0.1

url:http://kb.vmware.com/kb/1005896

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1807

Trust: 0.1

url:http://kb.vmware.com/kb/1055

Trust: 0.1

url:http://download3.vmware.com/software/esx/esx350-200806203-ug.zip

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5438

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3696

Trust: 0.1

url:http://kb.vmware.com/kb/1004824

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005117.tgz

Trust: 0.1

url:http://www.vmware.com/support/server/doc/releasenotes_server.html

Trust: 0.1

url:http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1004824.tgz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3696

Trust: 0.1

url:http://www.vmware.com/support/policies/eos_vi.html

Trust: 0.1

url:http://kb.vmware.com/kb/1005111

Trust: 0.1

url:http://kb.vmware.com/kb/1004823

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005108.tgz

Trust: 0.1

url:http://kb.vmware.com/kb/1005113

Trust: 0.1

url:http://www.vmware.com/download/player/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3697

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3698

Trust: 0.1

url:http://www.vmware.com/security

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5269

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1808

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx303-200808406-sg.zip

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005114.tgz

Trust: 0.1

url:http://www.vmware.com/download/ws/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3691

Trust: 0.1

url:http://www.vmware.com/support/policies/eos.html

Trust: 0.1

url:http://kb.vmware.com/kb/1005114

Trust: 0.1

url:http://www.vmware.com/download/server/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3693

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx303-200808403-sg.zip

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1807

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3694

Trust: 0.1

url:http://kb.vmware.com/kb/1005112

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3695

Trust: 0.1

url:http://www.vmware.com/support/player/doc/releasenotes_player.html

Trust: 0.1

url:http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

Trust: 0.1

url:http://www.vmware.com/download/ws/ws5.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3692

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3697

Trust: 0.1

url:http://kb.vmware.com/kb/1005109

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3695

Trust: 0.1

url:http://kb.vmware.com/kb/1005108

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1808

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx303-200808404-sg.zip

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2101

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1806

Trust: 0.1

url:http://kb.vmware.com/kb/1006357

Trust: 0.1

url:http://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005113.tgz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2101

Trust: 0.1

url:http://kb.vmware.com/kb/1006034

Trust: 0.1

url:http://kb.vmware.com/kb/1006035

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1006356.tgz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5503

Trust: 0.1

url:http://kb.vmware.com/kb/1005117

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3693

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005112.tgz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5269

Trust: 0.1

url:http://www.vmware.com/download/ace/

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005109.tgz

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3694

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1004823.tgz

Trust: 0.1

url:http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html

Trust: 0.1

url:http://download3.vmware.com/software/vi/esx-1005111.tgz

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3691

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5438

Trust: 0.1

url:http://www.vmware.com/support/player2/doc/releasenotes_player2.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3692

Trust: 0.1

url:http://software.hp.com

Trust: 0.1

url:https://www.hp.com/go/swa

Trust: 0.1

url:http://itrc.hp.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2926

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4313

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0025

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-4096

Trust: 0.1

url:https://h20566.www2.hp.com/portal/site/hpsc/patch/home/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4244

Trust: 0.1

url:http://secunia.com/advisories/31430/

Trust: 0.1

url:http://pinguar.org

Trust: 0.1

url:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.dsc

Trust: 0.1

url:http://packages.debian.org/<pkg>

Trust: 0.1

url:http://security.debian.org/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1_all.deb

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.diff.gz

Trust: 0.1

url:http://secunia.com/product/2536/

Trust: 0.1

url:http://rhn.redhat.com/errata/rhsa-2007-0740.html

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/2535/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/13653/

Trust: 0.1

url:http://secunia.com/product/48/

Trust: 0.1

url:http://rhn.redhat.com

Trust: 0.1

url:http://secunia.com/product/13651/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/4669/

Trust: 0.1

url:http://secunia.com/product/4668/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13652/

Trust: 0.1

url:http://secunia.com/product/1326/

Trust: 0.1

url:http://secunia.com/advisories/26152/

Trust: 0.1

url:http://secunia.com/product/1306/

Trust: 0.1

url:http://secunia.com/product/4670/

Trust: 0.1

url:http://secunia.com/product/2534/

Trust: 0.1

url:http://secunia.com/product/1044/

Trust: 0.1

url:https://www.xopenid.net

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3280

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0166

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // PACKETSTORM: 74443 // PACKETSTORM: 68412 // PACKETSTORM: 73732 // PACKETSTORM: 69536 // PACKETSTORM: 68878 // PACKETSTORM: 129616 // PACKETSTORM: 69021 // PACKETSTORM: 68546 // PACKETSTORM: 58035 // PACKETSTORM: 68924 // NVD: CVE-2008-1447

CREDITS

Hewlett Packard

Trust: 0.2

sources: PACKETSTORM: 74443 // PACKETSTORM: 68878

SOURCES

db:CERT/CCid:VU#800113
db:CERT/CCid:VU#252735
db:VULHUBid:VHN-31572
db:PACKETSTORMid:74443
db:PACKETSTORMid:68412
db:PACKETSTORMid:73732
db:PACKETSTORMid:69536
db:PACKETSTORMid:68878
db:PACKETSTORMid:129616
db:PACKETSTORMid:69021
db:PACKETSTORMid:68546
db:PACKETSTORMid:58035
db:PACKETSTORMid:68924
db:NVDid:CVE-2008-1447

LAST UPDATE DATE

2024-09-18T22:47:23.896000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#800113date:2014-04-14T00:00:00
db:CERT/CCid:VU#252735date:2008-08-06T00:00:00
db:VULHUBid:VHN-31572date:2020-03-24T00:00:00
db:NVDid:CVE-2008-1447date:2020-03-24T18:19:46.383

SOURCES RELEASE DATE

db:CERT/CCid:VU#800113date:2008-07-08T00:00:00
db:CERT/CCid:VU#252735date:2007-07-27T00:00:00
db:VULHUBid:VHN-31572date:2008-07-08T00:00:00
db:PACKETSTORMid:74443date:2009-01-29T21:47:08
db:PACKETSTORMid:68412date:2008-07-22T18:01:41
db:PACKETSTORMid:73732date:2009-01-12T19:16:04
db:PACKETSTORMid:69536date:2008-08-31T23:44:00
db:PACKETSTORMid:68878date:2008-08-06T21:52:19
db:PACKETSTORMid:129616date:2014-12-17T18:27:29
db:PACKETSTORMid:69021date:2008-08-13T04:21:24
db:PACKETSTORMid:68546date:2008-07-28T15:27:39
db:PACKETSTORMid:58035date:2007-07-26T04:26:32
db:PACKETSTORMid:68924date:2008-08-08T20:46:25
db:NVDid:CVE-2008-1447date:2008-07-08T23:41:00