ID

VAR-200707-0675


CVE

CVE-2008-1447


TITLE

Multiple DNS implementations vulnerable to cache poisoning

Trust: 0.8

sources: CERT/CC: VU#800113

DESCRIPTION

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug.". plural DNS There is a vulnerability in the implementation that makes cache poisoning attacks easier. Recent research has found a more efficient method of cash poisoning than previously known. DNS As a cache server, PC Please note that there is a possibility of attack. Cash poisoning attack forged response This is done by sending a packet. query The source port of the packet query By changing the value randomly every time, the probability of a successful cache poisoning attack can be reduced.By cash poisoning attack DNS Fake cache server DNS Information can be cached and DNS Nodes using the cache server may be directed to fake sites. Various implementations of DNS services may allow multiple simultaneous queries for the same resource record, allowing an attacker to apply probabilistic techniques to improve their odds of successful DNS spoofing. RESOLUTION The resolution is to discontinue the use of BIND/iX and migrate DNS services to another platform. =========================================================== Ubuntu Security Notice USN-627-1 July 22, 2008 dnsmasq vulnerability CVE-2008-1447 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.04 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.04 LTS: dnsmasq-base 2.41-2ubuntu2.1 After a standard system upgrade you need to restart Dnsmasq to effect the necessary changes. Details follow: Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Dnsmasq. Updated packages for Ubuntu 8.04 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.diff.gz Size/MD5: 22023 89c0f060733a11e414ef1fa634b17149 http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.dsc Size/MD5: 698 e44ebdb66be7abcaba3f1558b9379abb http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig.tar.gz Size/MD5: 357997 8d0acd6656299a800c4d1be5a1193e39 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1_all.deb Size/MD5: 11962 fbe42757babf0522e92a48438cdf7d0b amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_amd64.deb Size/MD5: 210032 015334862975edd0c6157624b9b4cd6b i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_i386.deb Size/MD5: 202466 87bebd172bae955ef2ae8f2de323a737 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_lpia.deb Size/MD5: 202996 8938160f148e63de63cad64e2721c6d6 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_powerpc.deb Size/MD5: 210320 865aa2d674736978b2b00a8623267fc4 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_sparc.deb Size/MD5: 204034 211f90a72d775d1987b6c3179786546f . Resolution ========== All BIND users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.2_p1" Note: In order to utilize the query port randomization to mitigate the weakness, you need to make sure that your network setup allows the DNS server to use random source ports for query and that you have not set a fixed query port via the "query-source port" directive in the BIND configuration. Corrected: 2008-07-12 10:07:33 UTC (RELENG_6, 6.3-STABLE) 2008-07-13 18:42:38 UTC (RELENG_6_3, 6.3-RELEASE-p3) 2008-07-13 18:42:38 UTC (RELENG_7, 7.0-STABLE) 2008-07-13 18:42:38 UTC (RELENG_7_0, 7.0-RELEASE-p3) CVE Name: CVE-2008-1447 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:http://security.FreeBSD.org/>. Background BIND 9 is an implementation of the Domain Name System (DNS) protocols. The named(8) daemon is an Internet Domain Name Server. DNS requests contain a query id which is used to match a DNS request with the response and to make it harder for anybody but the DNS server which received the request to send a valid response. This allows the attacker to influence or control the results of DNS queries being returned to users from target systems. To limit the machines able to perform recursive queries, add an ACL in named.conf and limit recursion like the following: acl example-acl { 192.0.2.0/24; }; options { recursion yes; allow-recursion { example-acl; }; }; V. Solution Perform one of the following: 1) Upgrade your vulnerable system to 6-STABLE or 7-STABLE, or to the RELENG_7_0 or RELENG_6_3 security branch dated after the correction date. 2) To patch your present system: The following patches have been verified to apply to FreeBSD 6.3 and 7.0 systems. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 6.3] # fetch http://security.FreeBSD.org/patches/SA-08:06/bind63.patch # fetch http://security.FreeBSD.org/patches/SA-08:06/bind63.patch.asc [FreeBSD 7.0] # fetch http://security.FreeBSD.org/patches/SA-08:06/bind7.patch # fetch http://security.FreeBSD.org/patches/SA-08:06/bind7.patch.asc b) Execute the following commands as root: # cd /usr/src # patch < /path/to/patch # cd /usr/src/lib/bind # make obj && make depend && make && make install # cd /usr/src/usr.sbin/named # make obj && make depend && make && make install NOTE WELL: This update causes BIND to choose a new, random UDP port for each new query; this may cause problems for some network configurations, particularly if firewall(s) block incoming UDP packets on particular ports. The avoid-v4-udp-ports and avoid-v6-udp-ports options should be used to avoid selecting random port numbers within a blocked range. Consequently it is strongly recommended that these options not be used to specify fixed port numbers. VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. Branch Revision Path - ------------------------------------------------------------------------- RELENG_6 src/contrib/bind9/bin/named/client.c 1.1.1.2.2.5 src/contrib/bind9/bin/named/server.c 1.1.1.2.2.4 src/contrib/bind9/lib/dns/api 1.1.1.2.2.5 src/contrib/bind9/lib/dns/dispatch.c 1.1.1.1.4.4 src/contrib/bind9/lib/dns/include/dns/dispatch.h 1.1.1.1.4.3 src/contrib/bind9/lib/dns/resolver.c 1.1.1.2.2.8 RELENG_6_3 src/UPDATING 1.416.2.37.2.8 src/sys/conf/newvers.sh 1.69.2.15.2.7 src/contrib/bind9/bin/named/client.c 1.1.1.2.2.3.2.1 src/contrib/bind9/bin/named/server.c 1.1.1.2.2.2.2.1 src/contrib/bind9/lib/dns/api 1.1.1.2.2.3.2.1 src/contrib/bind9/lib/dns/dispatch.c 1.1.1.1.4.2.2.1 src/contrib/bind9/lib/dns/include/dns/dispatch.h 1.1.1.1.4.1.2.1 src/contrib/bind9/lib/dns/resolver.c 1.1.1.2.2.6.2.1 RELENG_7 src/contrib/bind9/bin/named/client.c 1.1.1.6.2.2 src/contrib/bind9/bin/named/server.c 1.1.1.6.2.2 src/contrib/bind9/lib/dns/api 1.1.1.6.2.2 src/contrib/bind9/lib/dns/dispatch.c 1.1.1.4.2.2 src/contrib/bind9/lib/dns/include/dns/dispatch.h 1.1.1.3.2.2 src/contrib/bind9/lib/dns/resolver.c 1.1.1.9.2.2 RELENG_7_0 src/UPDATING 1.507.2.3.2.7 src/sys/conf/newvers.sh 1.72.2.5.2.7 src/contrib/bind9/bin/named/client.c 1.1.1.6.2.1.2.1 src/contrib/bind9/bin/named/server.c 1.1.1.6.2.1.2.1 src/contrib/bind9/lib/dns/api 1.1.1.6.2.1.2.1 src/contrib/bind9/lib/dns/dispatch.c 1.1.1.4.2.1.2.1 src/contrib/bind9/lib/dns/include/dns/dispatch.h 1.1.1.3.2.1.2.1 src/contrib/bind9/lib/dns/resolver.c 1.1.1.9.2.1.2.1 - ------------------------------------------------------------------------- VII. This change increases the size of the space from which an attacker has to guess values in a backwards-compatible fashion and makes successful attacks significantly more difficult. Note that this security update changes BIND network behavior in a fundamental way, and the following steps are recommended to ensure a smooth upgrade. Make sure that your network configuration is compatible with source port randomization. If you guard your resolver with a stateless packet filter, you may need to make sure that no non-DNS services listen on on the 1024--65535 UDP port range and open it at the packet filter. For instance, packet filters based on etch's Linux 2.6.18 kernel only support stateless filtering of IPv6 packets, and are therefore pose this additional difficulty. (If you use IPv4 with iptables and ESTABLISHED rules, networking changes are likely not required.) 2. Verify that the named process has been restarted and answers recursive queries. (If all queries result in timeouts, this indicates that networking changes are necessary; see the first step.) 3. Verify that source port randomization is active. Check that the /var/log/daemon.log file does not contain messages of the following form named[6106]: /etc/bind/named.conf.options:28: using specific query-source port suppresses port randomization and can be insecure. right after the "listening on IPv6 interface" and "listening on IPv4 interface" messages logged by BIND upon startup. For additional certainty, use tcpdump or some other network monitoring tool to check for varying UDP source ports. If you cannot activate source port randomization, consider configuring BIND 9 to forward queries to a resolver which can, possibly over a VPN such as OpenVPN to create the necessary trusted network link. (Use BIND's forward-only mode in this case.) Other caching resolvers distributed by Debian (PowerDNS, MaraDNS, Unbound) already employ source port randomization, and no updated packages are needed. BIND 9.5 up to and including version 1:9.5.0.dfsg-4 only implements a weak form of source port randomization and needs to be updated as well. For information on BIND 8, see DSA-1604-1, and for the status of the libc stub resolver, see DSA-1605-1. The updated bind9 packages contain changes originally scheduled for the next stable point release, including the changed IP address of L.ROOT-SERVERS.NET (Debian bug #449148). For the stable distribution (etch), this problem has been fixed in version 9.3.4-2etch3. For the unstable distribution (sid), this problem will be fixed soon. We recommend that you upgrade your bind9 package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - ------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3.dsc Size/MD5 checksum: 897 aeb15f8babb1e6e38367b9f19fea87da http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4.orig.tar.gz Size/MD5 checksum: 4043577 198181d47c58a0a9c0265862cd5557b0 http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3.diff.gz Size/MD5 checksum: 302126 521abea46b1104f2251cc398f30af303 Architecture independent packages: http://security.debian.org/pool/updates/main/b/bind9/bind9-doc_9.3.4-2etch3_all.deb Size/MD5 checksum: 189560 46ff778db82d2e171d292ecac93ea9b6 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 98154 bbdbcd3d0840f5ffcf4eaddf5a8c253f http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 1407380 ca8995875e76a25de6f32a47f62ea876 http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 226088 93100774ae6da891caf9fa27a2134cdf http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 112616 bca5dcca8abff15f4f9cc911f9f94818 http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 322286 677fdcf8e9a8c272a08ed47a79e09209 http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 190084 87d64554a1cdde9f58cc850f7d5961a1 http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 96508 48ba9fc0e884f093e95988bd4e088b9c http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 564862 7b23948d7c741d4f287698d28385ce71 http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 188742 5dd8024a9864137f4529785fcc9c9231 http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 116534 2e7dc9ea95bae40dc396ff504abb03bb http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_alpha.deb Size/MD5 checksum: 115784 b961fd6c797a2d1422ae588bfc25ed9d amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 224294 4d33744bb92300b061cad41dd8de7ea5 http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 1111932 e43ced7eae496d7835247a068bef4a66 http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 190742 9e39ced5d3464594b9dda6ce683fc653 http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 319008 e36a35983ebc5061e8669ef7f004a851 http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 552414 c93c2863bddd5661010ae3472e210aa8 http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 95922 f114eb76add0d7dabad1d082d38ccf08 http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 117072 a70d1d96ea01aa24fb9642e09133824f http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 187646 70372cec3522356dcd00901ea64714d4 http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 111270 6dc6edfcca9fecb28c7e66d31ab14a74 http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 114722 905d0f9b7b5ebc0308c54158e71d03cc http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_amd64.deb Size/MD5 checksum: 96704 09d3c850f12a6c1f6eab4e800a118c87 arm architecture (ARM) http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_arm.deb Size/MD5 checksum: 107888 b2ea4933e233a1af8dd1e5ee641999a2 http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_arm.deb Size/MD5 checksum: 112714 27b1fde9b144cacb1ae06a441d7c5787 http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_arm.deb Size/MD5 checksum: 116076 cafc3294083de02518ab5fe0f0488c3b http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_arm.deb Size/MD5 checksum: 532206 a005bdff779fed950e4750231d0184b2 http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_arm.deb Size/MD5 checksum: 187364 72fdca60a20876be71b678028cefc316 http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_arm.deb Size/MD5 checksum: 95752 bce98b259a2821d59f6e6b441b491d77 http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_arm.deb Size/MD5 checksum: 182950 26a15d51a4e6f1ea1dda99ab4d3ea34c http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_arm.deb Size/MD5 checksum: 217686 97f538e27ab7c765b514a9ce59869a41 http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_arm.deb Size/MD5 checksum: 95168 374d7f18915fc8eb6b775d272cf28f2e http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_arm.deb Size/MD5 checksum: 1074498 fdada51888027e9c3e89961b31a48ded http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_arm.deb Size/MD5 checksum: 311078 43d1c044b0cc81b072b8962ad3b8f019 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 96986 bba6d0a611b7088e284564b430f91405 http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 97140 14f3dacd102208700660873637dea18b http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 185570 012eb78b091c0991988a95160df7d65d http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 115822 d717418b7ec770e5419e0941670eab19 http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 543342 201331119c074430d503b68dc210e187 http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 1258146 2f092d0708338d0a3ac8924218fee0d7 http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 315070 bc8d94bec7b1c8cf80f64fb72d1f38e5 http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 187942 1cd85afac13850d1807a5b50b9d3262f http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 114612 912dc2007ca7cb6097a3e6a4e98897e3 http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 217378 49276452262a155ba17db2ad8c66e3e2 http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_hppa.deb Size/MD5 checksum: 113466 428d268ce8ad5386c1af758ca4cff2ce i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_i386.deb Size/MD5 checksum: 106034 ce4d4a024472317185d4c6492b7d30df http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_i386.deb Size/MD5 checksum: 180292 1fd02a86a31b68a8db2407904495a0db http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_i386.deb Size/MD5 checksum: 94838 9dbc2734dd8b8bb7c3e7684faabea64e http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_i386.deb Size/MD5 checksum: 206330 a22fb6cb47d6e449007d665b9e6d8c52 http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_i386.deb Size/MD5 checksum: 113162 b9bc5fa7f96313235a53ab6fd819b58b http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_i386.deb Size/MD5 checksum: 472708 9edfb07c186a93aea1a2e602e0ee6335 http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_i386.deb Size/MD5 checksum: 94822 d2fc00416dc090a535b280f48eee7f46 http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_i386.deb Size/MD5 checksum: 169930 47c43c9738afb7ed72618930dc702ed3 http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_i386.deb Size/MD5 checksum: 296722 dd1979969210386fc36d119e19e12cc2 http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_i386.deb Size/MD5 checksum: 996528 56db22ee21e053443e72ccd11a25181b http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_i386.deb Size/MD5 checksum: 110134 5491e4e33e43f1300840b62947690b7a ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 232052 eb9215cb2ba71ded815b4ca6f0ac0744 http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 99978 ceee4c1dc16fdf2d7fefe1aee6d8dd85 http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 393324 553b67ca638482db8e1586d231f03abe http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 740264 a30c98b25296a147d47d7f44c8418883 http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 127606 33d62368c2ce437e660708eb6b0ffe2b http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 216344 0a0b33f34dbeb744bd8af8ad8388048f http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 125806 3aafce71b9e4ecaf01602c409a355b54 http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 1584302 d982b4443c38056cdeb80b327ee36f3a http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 117782 ae8ae735a8054ff473d305b06c90c68a http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 102432 4443f6e43cc1e4c7448965a0501bfe54 http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_ia64.deb Size/MD5 checksum: 280866 c20244c3a06177b934ac804b382b85c7 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_mips.deb Size/MD5 checksum: 174012 cf61e15aa7c79b40ae94a3c1d08ba496 http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_mips.deb Size/MD5 checksum: 301476 4094fd919da162322ea07d62378cc664 http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_mips.deb Size/MD5 checksum: 110326 be73e626902012ca986d4192804017e7 http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_mips.deb Size/MD5 checksum: 180490 dde7f37a0a2456190461f5f26bf30ab6 http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_mips.deb Size/MD5 checksum: 1229398 37af92bf5074d9a260fd4ff5346dc4b8 http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_mips.deb Size/MD5 checksum: 211386 8083484e19ebc9099022954350c6baf7 http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_mips.deb Size/MD5 checksum: 94992 46f858e2ed33a864539476d25bd9b44f http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_mips.deb Size/MD5 checksum: 94230 6bfa6b8d78c46567a341f6174f9aa874 http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_mips.deb Size/MD5 checksum: 491862 fc2d747a29c0116da5936b4964ef8146 http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_mips.deb Size/MD5 checksum: 113268 58fb17d2ee0415e13fdad4727534b6cc http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_mips.deb Size/MD5 checksum: 107912 5834642a56bb9548510f8cd0a3ae766f mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 299514 0b5de102f7ddf83d497498b320613556 http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 488260 7b85b99ea5c24f74e531bbd9056672e9 http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 1205384 a3211957988d4aaae40776ff41cf6a01 http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 113016 dddd0a37c778cd68696318a7adc1abcd http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 110254 6754bc57fcac807b5569531f7e821802 http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 174148 23e91bbb42a44ca80535079660813277 http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 179630 fa26c51aa248cb502ac54544bdd6ced0 http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 210904 21784fc7019a384e78ecc94a10f4e315 http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 94936 2068abe2f2e78675ad94ea28579efc87 http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 107166 2cfce41a4fc41aa9986cdef01e09705d http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_mipsel.deb Size/MD5 checksum: 94098 c95a157cfa3feef62450afdef3fe65a8 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 173606 9618a781d59f94f751e18db86cf6b948 http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 112276 e786724068250eb53c475a3e51035d51 http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 113842 4961da1e75c17f3f00621acfc06d10fe http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 488428 b777fc3fe13b319817f955f116b40e83 http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 1167832 75f402f7bf328da5deee364f4266558d http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 96204 57ec688c7f24161e347054dc93fbd757 http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 96170 77d5b9189a05f2b3dca7901bff6e56df http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 301276 dddf71278c1f4afbbc49019248f4328e http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 109288 8fd2b3005fcf95e3616ec8a77b3ad322 http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 183310 b9eb85b58aaf29a3106d16410c0d379a http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_powerpc.deb Size/MD5 checksum: 206830 b286690dde8d1412c2de3fa99f7d3c5b s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_s390.deb Size/MD5 checksum: 114234 23a30b0e26db0210a1be48c4d44b6d7f http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_s390.deb Size/MD5 checksum: 331864 7c3fab929f1e29873ecfc7c7c4b52ddc http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_s390.deb Size/MD5 checksum: 116656 8abeeeb22e800f63e4b30e0c2dd974e0 http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_s390.deb Size/MD5 checksum: 1137342 820a17acdc24ef1dd0c1db7b8e6fc470 http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_s390.deb Size/MD5 checksum: 233948 635487d4e6ea4d15704bb14b8cf9236c http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_s390.deb Size/MD5 checksum: 196598 2198086ee8c358aa3ed5046708a31f45 http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_s390.deb Size/MD5 checksum: 194704 c897d956b11161ae8e31e4bffb489883 http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_s390.deb Size/MD5 checksum: 118140 e5e11d59852a32dcd1b78b4aabd22fff http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_s390.deb Size/MD5 checksum: 95664 050d558c3d06e520fb4e6c6cebd520c3 http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_s390.deb Size/MD5 checksum: 579484 6fc80f5cde0c2d01b49ae53f027eeecc http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_s390.deb Size/MD5 checksum: 97786 5dda64259aa80e1c2e085e7fc2430299 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 300090 21095a9477d8db8bdbca300235ddc296 http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 210606 8bd074b427b5f732c5584ca265bb2c28 http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 1121664 2750abf3a8e3ffa54d1b15f6a5b6738e http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 94822 4e2634cf2561a237174a6863377b24cd http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 175248 4231a2791083fc82977535613d38ef2a http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 184036 aea98952994fb97c74df02ae4ed2f28d http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 107574 b6a3a3204c134d54dce2d8d79f77f647 http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 493628 b5c5a9638091fd0d6543a405bfdefd53 http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 94828 4657a6a42f7f2fac5ef96d273e9de4df http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 114258 32f88744a6e6e648377dda42ff910cbb http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_sparc.deb Size/MD5 checksum: 111158 a59dbf1edb5518b09b2993049922c01a These files will probably be moved into the stable distribution on its next update. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200812-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Ruby: Multiple vulnerabilities Date: December 16, 2008 Bugs: #225465, #236060 ID: 200812-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in Ruby that allow for attacks including arbitrary code execution and Denial of Service. Background ========== Ruby is an interpreted object-oriented programming language. The elaborate standard library includes an HTTP server ("WEBRick") and a class for XML parsing ("REXML"). Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-lang/ruby < 1.8.6_p287-r1 >= 1.8.6_p287-r1 Description =========== Multiple vulnerabilities have been discovered in the Ruby interpreter and its standard libraries. Drew Yao of Apple Product Security discovered the following flaws: * Arbitrary code execution or Denial of Service (memory corruption) in the rb_str_buf_append() function (CVE-2008-2662). * Arbitrary code execution or Denial of Service (memory corruption) in the rb_ary_stor() function (CVE-2008-2663). * Memory corruption via alloca in the rb_str_format() function (CVE-2008-2664). * Memory corruption ("REALLOC_N") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2725). * Memory corruption ("beg + rlen") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2726). Furthermore, several other vulnerabilities have been reported: * Tanaka Akira reported an issue with resolv.rb that enables attackers to spoof DNS responses (CVE-2008-1447). * Akira Tagoh of RedHat discovered a Denial of Service (crash) issue in the rb_ary_fill() function in array.c (CVE-2008-2376). * Several safe level bypass vulnerabilities were discovered and reported by Keita Yamaguchi (CVE-2008-3655). * Christian Neukirchen is credited for discovering a Denial of Service (CPU consumption) attack in the WEBRick HTTP server (CVE-2008-3656). * A fault in the dl module allowed the circumvention of taintness checks which could possibly lead to insecure code execution was reported by "sheepman" (CVE-2008-3657). * Luka Treiber and Mitja Kolsek (ACROS Security) disclosed a Denial of Service (CPU consumption) vulnerability in the REXML module when dealing with recursive entity expansion (CVE-2008-3790). Impact ====== These vulnerabilities allow remote attackers to execute arbitrary code, spoof DNS responses, bypass Ruby's built-in security and taintness checks, and cause a Denial of Service via crash or CPU exhaustion. Workaround ========== There is no known workaround at this time. Resolution ========== All Ruby users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p287-r1" References ========== [ 1 ] CVE-2008-1447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 [ 2 ] CVE-2008-2376 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376 [ 3 ] CVE-2008-2662 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662 [ 4 ] CVE-2008-2663 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663 [ 5 ] CVE-2008-2664 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664 [ 6 ] CVE-2008-2725 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725 [ 7 ] CVE-2008-2726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726 [ 8 ] CVE-2008-3655 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655 [ 9 ] CVE-2008-3656 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656 [ 10 ] CVE-2008-3657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657 [ 11 ] CVE-2008-3790 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790 [ 12 ] CVE-2008-3905 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200812-17.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . HP-UX B.11.00. HP-UX B.11.00 may be affected by this vulnerability if the BINDv4 Domain Name Server (DNS) is configured to do both of the following: * support recursive requests and cache the results * respond to DNS requests made by untrusted systems To determine if an HP-UX system has an affected version, search the output of "swlist -a revision -l fileset" for one of the filesets listed below. AFFECTED VERSIONS HP-UX B.11.00 ============= InternetSrvcs.INETSVCS-RUN action: add "options no-recursion" to /etc/named.boot END AFFECTED VERSIONS RESOLUTION The potential vulnerability may be avoided by blocking access to the system from untrusted systems or by disabling DNS recursion. Note: This issue has been previously reported in HPSBGN01156 SSRT2400 rev.0 (7 August 2003). HPSBGN01156 did not have the Affected Versions for the HP-UX Security Patch Check. Background ========== Dnsmasq is a lightweight and easily-configurable DNS forwarder and DHCP server. * Carlos Carvalho reported that dnsmasq in the 2.43 version does not properly handle clients sending inform or renewal queries for unknown DHCP leases, leading to a crash (CVE-2008-3350). Furthermore, an attacker could generate invalid DHCP traffic and cause a Denial of Service. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA08-190B Multiple DNS implementations vulnerable to cache poisoning Original release date: July 08, 2008 Last revised: -- Source: US-CERT Systems Affected Systems implementing: * Caching DNS resolvers * DNS stub resolvers Affected systems include both client and server systems, and any other networked systems that include this functionality. Effective attack techniques against these vulnerabilities have been demonstrated. I. Examples of these vulnerabilities can be found in Vulnerability Note VU#800113. Tools and techniques have been developed that can reliably poison a domain of the attacker's choosing on most current implementations. As a result, the consensus of DNS software implementers is to implement source port randomization in their resolvers as a mitigation. US-CERT is tracking this issue as VU#800113. This reference number corresponds to CVE-2008-1447. II. Impact An attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control. III. Solution Apply a patch from your vendor Patches have been released by a number of vendors to implement source port randomization in the nameserver. Please see the Systems Affected section of Vulnerability Note VU#800113 for additional details for specific vendors. As mentioned above, stub resolvers are also vulnerable to these attacks. Stub resolvers that will issue queries in response to attacker behavior, and may receive packets from an attacker, should be patched. System administrators should be alert for patches to client operating systems that implement port randomization in the stub resolver. Workarounds Restrict access Administrators, particularly those who are unable to apply a patch, can limit exposure to this vulnerability by restricting sources that can ask for recursion. Note that restricting access will still allow attackers with access to authorized hosts to exploit this vulnerability. Filter traffic at network perimeters Because the ability to spoof IP addresses is necessary to conduct these attacks, administrators should take care to filter spoofed addresses at the network perimeter. IETF Request for Comments (RFC) documents RFC 2827, RFC 3704, and RFC 3013 describe best current practices (BCPs) for implementing this defense. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate. Run a local DNS cache In lieu of strong port randomization characteristics in a stub resolver, administrators can protect their systems by using local caching full-service resolvers, both on the client systems and on servers that are topologically close on the network to the client systems. This should be done in conjunction with the network segmentation and filtering strategies mentioned above. Disable recursion Disable recursion on any nameserver responding to DNS requests made by untrusted systems. Implement source port randomization Vendors that implement DNS software are encouraged to review IETF Internet Draft, "Measures for making DNS more resilient against forged answers," for additional information about implementing mitigations in their products. This document is a work in progress and may change prior to its publication as an RFC, if it is approved. IV. References * US-CERT Vulnerability Note VU#800113 - <http://www.kb.cert.org/vuls/id/800113> * US-CERT Vulnerability Note VU#484649 - <http://www.kb.cert.org/vuls/id/484649> * US-CERT Vulnerability Note VU#252735 - <http://www.kb.cert.org/vuls/id/252735> * US-CERT Vulnerability Note VU#927905 - <http://www.kb.cert.org/vuls/id/927905> * US-CERT Vulnerability Note VU#457875 - <http://www.kb.cert.org/vuls/id/457875> * Internet Draft: Measures for making DNS more resilient against forged answers - <http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience> * RFC 3833 - <http://tools.ietf.org/html/rfc3833> * RFC 2827 - <http://tools.ietf.org/html/rfc2827> * RFC 3704 - <http://tools.ietf.org/html/rfc3704> * RFC 3013 - <http://tools.ietf.org/html/rfc3013> * Microsoft Security Bulletin MS08-037 - <http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx> * Internet Systems Consortium BIND Vulnerabilities - <http://www.isc.org/sw/bind/bind-security.php> ____________________________________________________________________ US-CERT thanks Dan Kaminsky of IOActive and Paul Vixie of Internet Systems Consortium (ISC) for notifying us about this problem and for helping us to construct this advisory. ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA08-190B.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. ____________________________________________________________________ Produced 2008 by US-CERT, a government organization. There are two ways to deal with this situation: 1. The documentation included with BIND 9 contains a migration guide. Configure the BIND 8 resolver to forward queries to a BIND 9 resolver. Provided that the network between both resolvers is trusted, this protects the BIND 8 resolver from cache poisoning attacks (to the same degree that the BIND 9 resolver is protected). This problem does not apply to BIND 8 when used exclusively as an authoritative DNS server. BIND 8 (that is, the bind package) will be removed from the etch distribution in a future point release. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01506861 Version: 6 HPSBUX02351 SSRT080058 rev.6 - HP-UX Running BIND, Remote DNS Cache Poisoning NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2008-07-16 Last Updated: 2010-12-15 ----------------------------------------------------------------------------- Potential Security Impact: Remote DNS cache poisoning Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running BIND. References: CVE-2008-1447 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running BIND v9.3.2 or BIND v9.2.0, HP-UX B.11.11 running BIND v8.1.2 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2008-1447 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following software updates / patch to resolve the vulnerabilities for BIND v9.2.0 and BIND v9.3.2. Customers running BIND v8.1.2 on HP-UX B.11.11 should upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below. A new BIND v9.2.0 depot is available to address an issue encountered on HP-UX B.11.11. The new depot is available by contacting HP Support. The BIND v9.3.2 updates are available for download from: http://software.hp.com The patch PHNE_37865 is available from: http://itrc.hp.com HP-UX Release / Action B.11.11 running v8.1.2 / Upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. HP-UX Release / BIND Depot name / Action B.11.11 running v9.2.0 / BIND920V15.depot / Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. HP-UX Release / Action B.11.23 running v9.2.0 / Install PHNE_37865 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. HP-UX Release / Action B.11.11 running v9.3.2 / Install revision C.9.3.2.7.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. B.11.23 running v9.3.2 / Install revision C.9.3.2.7.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. B.11.31 running v9.3.2 / Install revision C.9.3.2.3.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Note: Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Note: Firewall configurations may need to be adjusted to allow DNS queries from random source ports to pass. In addition, firewalls that forward DNS queries must not replace the random source ports. MANUAL ACTIONS: Yes - NonUpdate Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Check firewall settings. For B.11.11 running v8.1.2, upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates For B.11.11 running v9.2.0 install BIND920v15.depot PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa AFFECTED VERSIONS For BIND v8.1.2 HP-UX B.11.11 ============= InternetSrvcs.INETSVCS-RUN action: upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. For BIND v9.3.2 HP-UX B.11.11 ============= BindUpgrade.BIND-UPGRADE action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com HP-UX B.11.23 ============= BindUpgrade.BIND-UPGRADE BindUpgrade.BIND2-UPGRADE action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com HP-UX B.11.31 ============= NameService.BIND-AUX NameService.BIND-RUN action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com For BIND v9.2.0 HP-UX B.11.11 ============= BINDv920.INETSVCS-BIND action: install revision B.11.11.01.015 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL Contact HP Support for information on where to download depot. HP-UX B.11.23 ============= InternetSrvcs.INETSVCS-INETD InternetSrvcs.INETSVCS-RUN InternetSrvcs.INETSVCS2-RUN action: install patch PHNE_37865 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://itrc.hp.com END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 16 July 2008 Initial release Version:2 (rev.2) - 19 July 2008 Added BIND v9.2.0 depot information Version:3 (rev.3) - 06 August 2008 Updated patch location, revised BIND v9.2.0 depot information, added BIND v8.1.2 Version:4 (rev.4) - 08 August 2008 Updated manual actions to include named.conf and firewall configuration setings Version:5 (rev.5) - 12 October 2010 Updated version for BIND v9.2.0 depot for B.11.11 Version:6 (rev.6) - 15 December 2010 Reformat v9.2.0 recommendation for clarity. Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk0JQB8ACgkQ4B86/C0qfVmfGwCeOT1oSjH7NZVlEmixFnjM5hWp gtAAnj1pfPTQUHenOf3lzoRYLUEoy6xf =/E+O -----END PGP SIGNATURE----- . Scott Kitterman noted that python-dns is vulnerable to this predictability, as it randomizes neither its transaction ID nor its source port. Taken together, this lack of entropy leaves applications using python-dns to perform DNS queries highly susceptible to response forgery. The Common Vulnerabilities and Exposures project identifies this class of weakness as CVE-2008-1447. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ SUSE Security Announcement Package: bind Announcement ID: SUSE-SA:2008:033 Date: Fri, 11 Jul 2008 09:00:00 +0000 Affected Products: openSUSE 10.2 openSUSE 10.3 openSUSE 11.0 SUSE SLES 9 Novell Linux Desktop 9 Open Enterprise Server Novell Linux POS 9 SUSE Linux Enterprise Desktop 10 SP1 SLE SDK 10 SP1 SLE SDK 10 SP2 SUSE Linux Enterprise Server 10 SP1 SUSE Linux Enterprise Desktop 10 SP2 SUSE Linux Enterprise Server 10 SP2 Vulnerability Type: DNS cache poisoning Severity (1-10): 9 SUSE Default Package: no Cross-References: CVE-2008-1447 Content of This Advisory: 1) Security Vulnerability Resolved: DNS cache poisoning 2) Solution or Work-Around 3) Special Instructions and Notes 4) Package Location and Checksums 5) Pending Vulnerabilities, Solutions, and Work-Arounds: 6) Authenticity Verification and Additional Information ______________________________________________________________________________ 1) Problem Description and Brief Discussion The bind daemon is responsible for resolving hostnames in IP addresses and vice versa. The new version of bind uses a random transaction-ID (TRXID) and a random UDP source-port for DNS queries to address DNS cache poisoning attacks possible because of the "birthday paradox" and an attack discovered by Dan Kaminsky. Unfortunately we do not have details about Kaminsky's attack and have to trust the statement that a random UDP source-port is sufficient to stop it. DNS servers that do not support recursive queries or do not use a cache (authoritative only servers) are not vulnerable too. Update packages of bind9 for SLES8 will be available soon. The glibc stub resolver is known to be vulnerable too and we will publish updates as soon as possible. Note, a local attacker can always sniff DNS queries and generate spoofed responses easily. If you use the UDP source-port number of the DNS server in your firewall configuration, for example to let DNS queries through your packetfilter, then you have to take steps to adapt your filter rules to the new behavior of the DNS server. One that is authoritative only and accessible from the Internet to resolve queries for your local systems that are available over the Internet. The other system (caching) is not accessible over the Internet and can be used by internal clients to recursively lookup names and addresses. But we encourage you to install the bind update as soon as possible too. If you use the latest update of pdns-recursor you are not vulnerable to this attack. For the glibc stub resolver bug you can install a local secure DNS for- warder on your machine or make a DNS forwarder available for a protected network. 3) Special Instructions and Notes Please restart the bind daemon after the update. 4) Package Location and Checksums The preferred method for installing security updates is to use the YaST Online Update (YOU) tool. YOU detects which updates are required and automatically performs the necessary steps to verify and install them. Alternatively, download the update packages for your distribution manually and verify their integrity by the methods listed in Section 6 of this announcement. Then install the packages using the command rpm -Fhv <file.rpm> to apply the update, replacing <file.rpm> with the filename of the downloaded RPM package. x86 Platform: openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-chrootenv-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-devel-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-doc-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-libs-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-utils-9.4.2-39.2.i586.rpm openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-chrootenv-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-devel-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-doc-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-libs-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-utils-9.4.1.P1-12.5.i586.rpm openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-chrootenv-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-devel-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-doc-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-libs-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-utils-9.3.5P1-0.1.i586.rpm x86-64 Platform: openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/bind-libs-32bit-9.4.2-39.2.x86_64.rpm openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/bind-libs-32bit-9.4.1.P1-12.5.x86_64.rpm openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/bind-libs-32bit-9.3.5P1-0.1.x86_64.rpm Sources: openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/bind-9.4.2-39.2.src.rpm openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/bind-9.4.1.P1-12.5.src.rpm openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/bind-9.3.5P1-0.1.src.rpm Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web: Open Enterprise Server http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html Novell Linux POS 9 http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html Novell Linux Desktop 9 http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html SUSE SLES 9 http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html SUSE Linux Enterprise Server 10 SP1 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SUSE Linux Enterprise Server 10 SP2 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SLE SDK 10 SP2 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SUSE Linux Enterprise 10 SP2 DEBUGINFO http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SLE SDK 10 SP1 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SUSE Linux Enterprise Desktop 10 SP1 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SUSE Linux Enterprise Desktop 10 SP2 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html ______________________________________________________________________________ 5) Pending Vulnerabilities, Solutions, and Work-Arounds: none ______________________________________________________________________________ 6) Authenticity Verification and Additional Information - Announcement authenticity verification: SUSE security announcements are published via mailing lists and on Web sites. The authenticity and integrity of a SUSE security announcement is guaranteed by a cryptographic signature in each announcement. All SUSE security announcements are published with a valid signature. To verify the signature of the announcement, save it as text into a file and run the command gpg --verify <file> replacing <file> with the name of the file where you saved the announcement. The output for a valid signature looks like: gpg: Signature made <DATE> using RSA key ID 3D25D3D9 gpg: Good signature from "SuSE Security Team <security@suse.de>" where <DATE> is replaced by the date the document was signed. If the security team's key is not contained in your key ring, you can import it from the first installation CD. To import the key, use the command gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc - Package authenticity verification: SUSE update packages are available on many mirror FTP servers all over the world. While this service is considered valuable and important to the free and open source software community, the authenticity and the integrity of a package needs to be verified to ensure that it has not been tampered with. The internal rpm package signatures provide an easy way to verify the authenticity of an RPM package. Use the command rpm -v --checksig <file.rpm> to verify the signature of the package, replacing <file.rpm> with the filename of the RPM package downloaded. The package is unmodified if it contains a valid signature from build@suse.de with the key ID 9C800ACA. This key is automatically imported into the RPM database (on RPMv4-based distributions) and the gpg key ring of 'root' during installation. You can also find it on the first installation CD and at the end of this announcement. - SUSE runs two security mailing lists to which any interested party may subscribe: opensuse-security@opensuse.org - General Linux and SUSE security discussion. All SUSE security announcements are sent to this list. To subscribe, send an e-mail to <opensuse-security+subscribe@opensuse.org>. opensuse-security-announce@opensuse.org - SUSE's announce-only mailing list. Only SUSE's security announcements are sent to this list. To subscribe, send an e-mail to <opensuse-security-announce+subscribe@opensuse.org>. ===================================================================== SUSE's security contact is <security@suse.com> or <security@suse.de>. The <security@suse.de> public key is listed below. ===================================================================== ______________________________________________________________________________ The information in this advisory may be distributed or reproduced, provided that the advisory is not modified in any way. In particular, the clear text signature should show proof of the authenticity of the text. SUSE Linux Products GmbH provides no warranties of any kind whatsoever with respect to the information contained in this security advisory. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 4.41

sources: NVD: CVE-2008-1447 // JVNDB: JVNDB-2008-001495 // CERT/CC: VU#457875 // CERT/CC: VU#800113 // PACKETSTORM: 74443 // PACKETSTORM: 68412 // PACKETSTORM: 68129 // PACKETSTORM: 68183 // PACKETSTORM: 68036 // VULHUB: VHN-31572 // PACKETSTORM: 68360 // PACKETSTORM: 73060 // PACKETSTORM: 46512 // PACKETSTORM: 69643 // PACKETSTORM: 68061 // PACKETSTORM: 68037 // PACKETSTORM: 96747 // PACKETSTORM: 68546 // PACKETSTORM: 68118

AFFECTED PRODUCTS

vendor:iscmodel:bindscope:eqversion:8

Trust: 1.8

vendor:apple computermodel: - scope: - version: -

Trust: 1.6

vendor:fujitsumodel: - scope: - version: -

Trust: 1.6

vendor:infobloxmodel: - scope: - version: -

Trust: 1.6

vendor:microsoftmodel: - scope: - version: -

Trust: 1.6

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:4

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.2.9

Trust: 1.0

vendor:alcatel lucentmodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:bluecatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:force10model: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:funkwerkmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:internet consortiummodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:nixumodel: - scope: - version: -

Trust: 0.8

vendor:nominummodel: - scope: - version: -

Trust: 0.8

vendor:nortelmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:qnxmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:wind rivermodel: - scope: - version: -

Trust: 0.8

vendor:yamahamodel: - scope: - version: -

Trust: 0.8

vendor:dnsmasqmodel: - scope: - version: -

Trust: 0.8

vendor:debianmodel: - scope: - version: -

Trust: 0.8

vendor:iscmodel: - scope: - version: -

Trust: 0.8

vendor:metasolvmodel: - scope: - version: -

Trust: 0.8

vendor:netbsdmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel:aixscope:eqversion:5.2

Trust: 0.8

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.8

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5 to v10.5.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5 to v10.5.4

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:v1.1 to v2.0.2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8624el

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8624ps

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8724sl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8724sl v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8724xl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8748sl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8748xl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8948xl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9606sx/sc

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9606t

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9812t

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9816gb

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9924sp

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9924t/4sp

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9924ts

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar260s v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar410 v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar410s v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar415s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar450s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar550s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar570s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar740

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar740s

Trust: 0.8

vendor:allied telesismodel:switchblade4000scope: - version: -

Trust: 0.8

vendor:internet initiativemodel:id gatewayscope: - version: -

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:sun microsystemsmodel:opensolarisscope:eqversion:(sparc)

Trust: 0.8

vendor:sun microsystemsmodel:opensolarisscope:eqversion:(x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (x86)

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.8

vendor:centurymodel:xr-1100scope:eqversion:ver1.6.2 previous version

Trust: 0.8

vendor:centurymodel:xr-410scope:eqversion:ver1.6.9 previous version

Trust: 0.8

vendor:centurymodel:xr-410-l2scope:eqversion:ver1.6.1 previous version

Trust: 0.8

vendor:centurymodel:xr-440scope:eqversion:ver1.7.7 previous version

Trust: 0.8

vendor:centurymodel:xr-510scope:eqversion:ver3.5.3 previous version

Trust: 0.8

vendor:centurymodel:xr-540scope:eqversion:ver3.5.2 previous version

Trust: 0.8

vendor:centurymodel:xr-640scope:eqversion:ver1.6.7 previous version

Trust: 0.8

vendor:centurymodel:xr-640-l2scope:eqversion:ver1.6.1 previous version

Trust: 0.8

vendor:centurymodel:xr-730scope:eqversion:ver3.5.0 previous version

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:1.0 (hosting)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:1.0 (workgroup)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:2.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11 (x64)

Trust: 0.8

vendor:hewlett packardmodel:hp tru64 unixscope:eqversion:v 5.1b-3

Trust: 0.8

vendor:hewlett packardmodel:hp tru64 unixscope:eqversion:v 5.1b-4

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.31

Trust: 0.8

vendor:microsoftmodel:windows 2000scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:(rt100i

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:rt102i

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:rt103i

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:rt200i

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:rt80i)

Trust: 0.8

vendor:yamahamodel:rt105 seriesscope:eqversion:(rt105i

Trust: 0.8

vendor:yamahamodel:rt105 seriesscope:eqversion:rt105e

Trust: 0.8

vendor:yamahamodel:rt105 seriesscope:eqversion:rt105p)

Trust: 0.8

vendor:yamahamodel:rt107escope: - version: -

Trust: 0.8

vendor:yamahamodel:rt140 seriesscope:eqversion:(rt140i

Trust: 0.8

vendor:yamahamodel:rt140 seriesscope:eqversion:rt140e

Trust: 0.8

vendor:yamahamodel:rt140 seriesscope:eqversion:rt140p

Trust: 0.8

vendor:yamahamodel:rt140 seriesscope:eqversion:rt140f)

Trust: 0.8

vendor:yamahamodel:rt300iscope: - version: -

Trust: 0.8

vendor:yamahamodel:rt58iscope: - version: -

Trust: 0.8

vendor:yamahamodel:rta seriesscope:eqversion:(rta55i

Trust: 0.8

vendor:yamahamodel:rta seriesscope:eqversion:rta54i

Trust: 0.8

vendor:yamahamodel:rta seriesscope:eqversion:rta52i

Trust: 0.8

vendor:yamahamodel:rta seriesscope:eqversion:rta50i)

Trust: 0.8

vendor:yamahamodel:rtv seriesscope:eqversion:(rtv700

Trust: 0.8

vendor:yamahamodel:rtv seriesscope:eqversion:rtv01)

Trust: 0.8

vendor:yamahamodel:rtw seriesscope:eqversion:(rt60w

Trust: 0.8

vendor:yamahamodel:rtw seriesscope:eqversion:rtw65i

Trust: 0.8

vendor:yamahamodel:rtw seriesscope:eqversion:rtw65b)

Trust: 0.8

vendor:yamahamodel:rtx1000scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx1100scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx1500scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx2000scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx3000scope: - version: -

Trust: 0.8

vendor:yamahamodel:srt100scope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:linux advanced workstationscope:eqversion:2.1

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-e seriesscope:eqversion:fitelnet-e20/e30

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f40

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f80/f100/f120/f140/f1000/f2000

Trust: 0.8

vendor:necmodel:ip38x seriesscope: - version: -

Trust: 0.8

vendor:necmodel:ix1000 seriesscope: - version: -

Trust: 0.8

vendor:necmodel:ix2000 seriesscope: - version: -

Trust: 0.8

vendor:necmodel:ix3000 seriesscope: - version: -

Trust: 0.8

vendor:fujitsumodel:ipcom seriesscope: - version: -

Trust: 0.8

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 0.6

vendor:redhatmodel:enterprise linuxscope:eqversion:2.1

Trust: 0.6

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 0.6

vendor:redhatmodel:linux advanced workstationscope:eqversion:2.1

Trust: 0.6

sources: CERT/CC: VU#800113 // CERT/CC: VU#457875 // JVNDB: JVNDB-2008-001495 // CNNVD: CNNVD-200807-129 // NVD: CVE-2008-1447

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1447
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#800113
value: 27.54

Trust: 0.8

CARNEGIE MELLON: VU#457875
value: 40.50

Trust: 0.8

NVD: CVE-2008-1447
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200807-129
value: MEDIUM

Trust: 0.6

VULHUB: VHN-31572
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2008-1447
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-31572
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: CERT/CC: VU#800113 // CERT/CC: VU#457875 // VULHUB: VHN-31572 // JVNDB: JVNDB-2008-001495 // CNNVD: CNNVD-200807-129 // NVD: CVE-2008-1447

PROBLEMTYPE DATA

problemtype:CWE-331

Trust: 1.1

problemtype:CWE-20

Trust: 0.8

problemtype:CWE-310

Trust: 0.1

sources: VULHUB: VHN-31572 // JVNDB: JVNDB-2008-001495 // NVD: CVE-2008-1447

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 68412 // PACKETSTORM: 68183 // PACKETSTORM: 46512 // CNNVD: CNNVD-200807-129

TYPE

security feature problem

Trust: 0.6

sources: CNNVD: CNNVD-200807-129

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001495

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-31572

PATCH

title:APPLE-SA-2008-09-12url:http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html

Trust: 0.8

title:APPLE-SA-2008-09-15url:http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html

Trust: 0.8

title:APPLE-SA-2008-07-31url:http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html

Trust: 0.8

title:APPLE-SA-2008-09-09url:http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html

Trust: 0.8

title:Security Update 2008-006url:http://support.apple.com/kb/HT3137

Trust: 0.8

title:Security Update 2008-005url:http://support.apple.com/kb/HT2647

Trust: 0.8

title:iPod touch v2.1url:http://support.apple.com/kb/HT3026

Trust: 0.8

title:bind-9.3.3-10.4AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=140

Trust: 0.8

title:dnsmasq-2.45-1AXS3.1.1url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=345

Trust: 0.8

title:cisco-sa-20080708-dnsurl:http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml

Trust: 0.8

title:20080709url:http://www.furukawa.co.jp/fitelnet/topic/vulnera_20080709.html

Trust: 0.8

title:DNS cache poisoningurl:http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc

Trust: 0.8

title:JVNVU800113url:http://www.centurysys.co.jp/support/xr_common/JVNVU800113.html

Trust: 0.8

title:HPSBUX02351url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01506861

Trust: 0.8

title:HPSBOV02357 SSRT080058url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01662368

Trust: 0.8

title:HPSBMP02404 SSRT090014url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01660723

Trust: 0.8

title:HPSBUX02358url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01527346

Trust: 0.8

title:IZ26672url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26672

Trust: 0.8

title:IZ26667url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26667

Trust: 0.8

title:IZ26668url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26668

Trust: 0.8

title:IZ26671url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26671

Trust: 0.8

title:IZ26670url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26670

Trust: 0.8

title:IZ26669url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26669

Trust: 0.8

title:4525url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4525

Trust: 0.8

title:4338url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4338

Trust: 0.8

title:Top Pageurl:http://www.iij.ad.jp

Trust: 0.8

title:CERT VU#800113 DNS Cache Poisoning Issueurl:http://www.isc.org/index.pl?/sw/bind/bind-security.php

Trust: 0.8

title:956187url:http://www.microsoft.com/technet/security/advisory/956187.mspx

Trust: 0.8

title:MS08-037url:http://www.microsoft.com/technet/security/bulletin/MS08-037.mspx

Trust: 0.8

title:1316url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1316

Trust: 0.8

title:1649url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1649

Trust: 0.8

title:1296url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1296

Trust: 0.8

title:1297url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1297

Trust: 0.8

title:NV08-008url:http://www.nec.co.jp/security-info/secinfo/nv08-008.html

Trust: 0.8

title:RHSA-2008:0789url:https://rhn.redhat.com/errata/RHSA-2008-0789.html

Trust: 0.8

title:RHSA-2008:0533url:http://rhn.redhat.com/errata/RHSA-2008-0533.html

Trust: 0.8

title:VU800113url:http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html

Trust: 0.8

title:239392url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-239392-1

Trust: 0.8

title:240048url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-240048-1

Trust: 0.8

title:dns_12url:http://fenics.fujitsu.com/products/support/2008/dns_12.html

Trust: 0.8

title:DNSに関するキャッシュポイズニング脆弱性についてurl:http://www.allied-telesis.co.jp/support/list/faq/vuls/20080813.html

Trust: 0.8

title:956187url:http://www.microsoft.com/japan/technet/security/advisory/956187.mspx

Trust: 0.8

title:MS08-037url:http://www.microsoft.com/japan/technet/security/bulletin/ms08-037.mspx

Trust: 0.8

title:RHSA-2008:0533url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0533J.html

Trust: 0.8

title:RHSA-2008:0789url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0789J.html

Trust: 0.8

title:MS08-037eurl:http://www.microsoft.com/japan/security/bulletins/MS08-037e.mspx

Trust: 0.8

title:TLSA-2008-26url:http://www.turbolinux.co.jp/security/2008/TLSA-2008-26j.txt

Trust: 0.8

title:TA08-190Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-190a.html

Trust: 0.8

title:TA08-190Burl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-190b.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-001495

EXTERNAL IDS

db:NVDid:CVE-2008-1447

Trust: 3.8

db:CERT/CCid:VU#800113

Trust: 3.5

db:USCERTid:TA08-190B

Trust: 2.6

db:SECUNIAid:30980

Trust: 2.5

db:SECUNIAid:31014

Trust: 2.5

db:SECUNIAid:30925

Trust: 2.5

db:USCERTid:TA08-260A

Trust: 2.5

db:USCERTid:TA08-190A

Trust: 2.5

db:BIDid:30131

Trust: 2.5

db:VUPENid:ADV-2008-2025

Trust: 1.7

db:VUPENid:ADV-2009-0297

Trust: 1.7

db:VUPENid:ADV-2008-2334

Trust: 1.7

db:VUPENid:ADV-2008-2383

Trust: 1.7

db:VUPENid:ADV-2008-2113

Trust: 1.7

db:VUPENid:ADV-2008-2558

Trust: 1.7

db:VUPENid:ADV-2008-2019

Trust: 1.7

db:VUPENid:ADV-2008-2377

Trust: 1.7

db:VUPENid:ADV-2008-2584

Trust: 1.7

db:VUPENid:ADV-2008-2342

Trust: 1.7

db:VUPENid:ADV-2010-0622

Trust: 1.7

db:VUPENid:ADV-2008-2166

Trust: 1.7

db:VUPENid:ADV-2008-2051

Trust: 1.7

db:VUPENid:ADV-2008-2092

Trust: 1.7

db:VUPENid:ADV-2008-2029

Trust: 1.7

db:VUPENid:ADV-2008-2384

Trust: 1.7

db:VUPENid:ADV-2008-2268

Trust: 1.7

db:VUPENid:ADV-2008-2052

Trust: 1.7

db:VUPENid:ADV-2008-2549

Trust: 1.7

db:VUPENid:ADV-2008-2197

Trust: 1.7

db:VUPENid:ADV-2009-0311

Trust: 1.7

db:VUPENid:ADV-2008-2055

Trust: 1.7

db:VUPENid:ADV-2008-2467

Trust: 1.7

db:VUPENid:ADV-2008-2123

Trust: 1.7

db:VUPENid:ADV-2008-2482

Trust: 1.7

db:VUPENid:ADV-2008-2525

Trust: 1.7

db:VUPENid:ADV-2008-2023

Trust: 1.7

db:VUPENid:ADV-2008-2582

Trust: 1.7

db:VUPENid:ADV-2008-2114

Trust: 1.7

db:VUPENid:ADV-2008-2196

Trust: 1.7

db:VUPENid:ADV-2008-2139

Trust: 1.7

db:VUPENid:ADV-2008-2466

Trust: 1.7

db:VUPENid:ADV-2008-2050

Trust: 1.7

db:VUPENid:ADV-2008-2195

Trust: 1.7

db:VUPENid:ADV-2008-2291

Trust: 1.7

db:VUPENid:ADV-2008-2030

Trust: 1.7

db:SECTRACKid:1020548

Trust: 1.7

db:SECTRACKid:1020578

Trust: 1.7

db:SECTRACKid:1020448

Trust: 1.7

db:SECTRACKid:1020558

Trust: 1.7

db:SECTRACKid:1020702

Trust: 1.7

db:SECTRACKid:1020440

Trust: 1.7

db:SECTRACKid:1020575

Trust: 1.7

db:SECTRACKid:1020437

Trust: 1.7

db:SECTRACKid:1020802

Trust: 1.7

db:SECTRACKid:1020449

Trust: 1.7

db:SECTRACKid:1020579

Trust: 1.7

db:SECTRACKid:1020561

Trust: 1.7

db:SECTRACKid:1020804

Trust: 1.7

db:SECTRACKid:1020577

Trust: 1.7

db:SECTRACKid:1020560

Trust: 1.7

db:SECTRACKid:1020651

Trust: 1.7

db:SECTRACKid:1020653

Trust: 1.7

db:SECTRACKid:1020438

Trust: 1.7

db:SECTRACKid:1020576

Trust: 1.7

db:SECUNIAid:31209

Trust: 1.7

db:SECUNIAid:31197

Trust: 1.7

db:SECUNIAid:31422

Trust: 1.7

db:SECUNIAid:30977

Trust: 1.7

db:SECUNIAid:31151

Trust: 1.7

db:SECUNIAid:31354

Trust: 1.7

db:SECUNIAid:31093

Trust: 1.7

db:SECUNIAid:31212

Trust: 1.7

db:SECUNIAid:31207

Trust: 1.7

db:SECUNIAid:31221

Trust: 1.7

db:SECUNIAid:31254

Trust: 1.7

db:SECUNIAid:31451

Trust: 1.7

db:SECUNIAid:31169

Trust: 1.7

db:SECUNIAid:30988

Trust: 1.7

db:SECUNIAid:30973

Trust: 1.7

db:SECUNIAid:31687

Trust: 1.7

db:SECUNIAid:31199

Trust: 1.7

db:SECUNIAid:31137

Trust: 1.7

db:SECUNIAid:30998

Trust: 1.7

db:SECUNIAid:31065

Trust: 1.7

db:SECUNIAid:31882

Trust: 1.7

db:SECUNIAid:31019

Trust: 1.7

db:SECUNIAid:31153

Trust: 1.7

db:SECUNIAid:31482

Trust: 1.7

db:SECUNIAid:31495

Trust: 1.7

db:SECUNIAid:33178

Trust: 1.7

db:SECUNIAid:33714

Trust: 1.7

db:SECUNIAid:31213

Trust: 1.7

db:SECUNIAid:31326

Trust: 1.7

db:SECUNIAid:31052

Trust: 1.7

db:SECUNIAid:31011

Trust: 1.7

db:SECUNIAid:31588

Trust: 1.7

db:SECUNIAid:31033

Trust: 1.7

db:SECUNIAid:31031

Trust: 1.7

db:SECUNIAid:31430

Trust: 1.7

db:SECUNIAid:30979

Trust: 1.7

db:SECUNIAid:31022

Trust: 1.7

db:SECUNIAid:31094

Trust: 1.7

db:SECUNIAid:31030

Trust: 1.7

db:SECUNIAid:31204

Trust: 1.7

db:SECUNIAid:31072

Trust: 1.7

db:SECUNIAid:31152

Trust: 1.7

db:SECUNIAid:31237

Trust: 1.7

db:SECUNIAid:31012

Trust: 1.7

db:SECUNIAid:33786

Trust: 1.7

db:SECUNIAid:31143

Trust: 1.7

db:SECUNIAid:31236

Trust: 1.7

db:SECUNIAid:31900

Trust: 1.7

db:SECUNIAid:30989

Trust: 1.7

db:SECUNIAid:31823

Trust: 1.7

db:EXPLOIT-DBid:6130

Trust: 1.7

db:EXPLOIT-DBid:6123

Trust: 1.7

db:EXPLOIT-DBid:6122

Trust: 1.7

db:CERT/CCid:VU#457875

Trust: 1.0

db:USCERTid:SA08-190A

Trust: 0.8

db:JVNDBid:JVNDB-2008-001495

Trust: 0.8

db:CNNVDid:CNNVD-200807-129

Trust: 0.6

db:PACKETSTORMid:68412

Trust: 0.2

db:PACKETSTORMid:68118

Trust: 0.2

db:PACKETSTORMid:73060

Trust: 0.2

db:PACKETSTORMid:68061

Trust: 0.2

db:PACKETSTORMid:74443

Trust: 0.2

db:PACKETSTORMid:96747

Trust: 0.2

db:PACKETSTORMid:68183

Trust: 0.2

db:PACKETSTORMid:68036

Trust: 0.2

db:PACKETSTORMid:68360

Trust: 0.2

db:PACKETSTORMid:68037

Trust: 0.2

db:PACKETSTORMid:68129

Trust: 0.2

db:PACKETSTORMid:68546

Trust: 0.2

db:PACKETSTORMid:68878

Trust: 0.1

db:PACKETSTORMid:68038

Trust: 0.1

db:PACKETSTORMid:68755

Trust: 0.1

db:PACKETSTORMid:68502

Trust: 0.1

db:PACKETSTORMid:68288

Trust: 0.1

db:PACKETSTORMid:94774

Trust: 0.1

db:PACKETSTORMid:68199

Trust: 0.1

db:PACKETSTORMid:68068

Trust: 0.1

db:PACKETSTORMid:68471

Trust: 0.1

db:PACKETSTORMid:73732

Trust: 0.1

db:PACKETSTORMid:70207

Trust: 0.1

db:PACKETSTORMid:68039

Trust: 0.1

db:PACKETSTORMid:68500

Trust: 0.1

db:PACKETSTORMid:68691

Trust: 0.1

db:PACKETSTORMid:68473

Trust: 0.1

db:PACKETSTORMid:68554

Trust: 0.1

db:PACKETSTORMid:68063

Trust: 0.1

db:PACKETSTORMid:68543

Trust: 0.1

db:SEEBUGid:SSVID-65607

Trust: 0.1

db:VULHUBid:VHN-31572

Trust: 0.1

db:PACKETSTORMid:46512

Trust: 0.1

db:PACKETSTORMid:69643

Trust: 0.1

db:CERT/CCid:VU#484649

Trust: 0.1

db:CERT/CCid:VU#252735

Trust: 0.1

db:CERT/CCid:VU#927905

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#457875 // VULHUB: VHN-31572 // JVNDB: JVNDB-2008-001495 // PACKETSTORM: 74443 // PACKETSTORM: 68412 // PACKETSTORM: 68129 // PACKETSTORM: 68183 // PACKETSTORM: 68036 // PACKETSTORM: 68118 // PACKETSTORM: 68360 // PACKETSTORM: 73060 // PACKETSTORM: 46512 // PACKETSTORM: 69643 // PACKETSTORM: 68061 // PACKETSTORM: 68037 // PACKETSTORM: 96747 // PACKETSTORM: 68546 // CNNVD: CNNVD-200807-129 // NVD: CVE-2008-1447

REFERENCES

url:http://www.kb.cert.org/vuls/id/800113

Trust: 2.6

url:http://www.securityfocus.com/bid/30131

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta08-190a.html

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta08-190b.html

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta08-260a.html

Trust: 2.5

url:http://support.citrix.com/article/ctx117991

Trust: 2.3

url:http://support.citrix.com/article/ctx118183

Trust: 2.3

url:http://security.freebsd.org/advisories/freebsd-sa-08:06.bind.asc

Trust: 1.8

url:http://security.gentoo.org/glsa/glsa-200807-08.xml

Trust: 1.8

url:http://security.gentoo.org/glsa/glsa-200812-17.xml

Trust: 1.8

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26667

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26668

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26669

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26670

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26671

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26672

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00003.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00004.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00005.html

Trust: 1.7

url:http://www.securityfocus.com/archive/1/495289/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/495869/100/0/threaded

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00809c2168.shtml

Trust: 1.7

url:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401

Trust: 1.7

url:http://support.apple.com/kb/ht3026

Trust: 1.7

url:http://support.apple.com/kb/ht3129

Trust: 1.7

url:http://up2date.astaro.com/2008/08/up2date_7202_released.html

Trust: 1.7

url:http://wiki.rpath.com/wiki/advisories:rpsa-2008-0231

Trust: 1.7

url:http://wiki.rpath.com/wiki/advisories:rpsa-2010-0018

Trust: 1.7

url:http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning

Trust: 1.7

url:http://www.isc.org/index.pl?/sw/bind/bind-security.php

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/mimg-7dwr4j

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/mimg-7ecl8q

Trust: 1.7

url:http://www.novell.com/support/viewcontent.do?externalid=7000912

Trust: 1.7

url:http://www.phys.uu.nl/~rombouts/pdnsd.html

Trust: 1.7

url:http://www.phys.uu.nl/~rombouts/pdnsd/changelog

Trust: 1.7

url:http://www.rtpro.yamaha.co.jp/rt/faq/security/vu800113.html

Trust: 1.7

url:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/

Trust: 1.7

url:http://www.vmware.com/security/advisories/vmsa-2008-0014.html

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1603

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1604

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1605

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1619

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1623

Trust: 1.7

url:https://www.exploit-db.com/exploits/6122

Trust: 1.7

url:https://www.exploit-db.com/exploits/6123

Trust: 1.7

url:https://www.exploit-db.com/exploits/6130

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00402.html

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00458.html

Trust: 1.7

url:http://lists.grok.org.uk/pipermail/full-disclosure/2008-august/064118.html

Trust: 1.7

url:http://security.gentoo.org/glsa/glsa-201209-25.xml

Trust: 1.7

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01662368

Trust: 1.7

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01523520

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2008:139

Trust: 1.7

url:http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html

Trust: 1.7

url:http://www.caughq.org/exploits/cau-ex-2008-0002.txt

Trust: 1.7

url:http://www.caughq.org/exploits/cau-ex-2008-0003.txt

Trust: 1.7

url:http://www.doxpara.com/?p=1176

Trust: 1.7

url:http://www.doxpara.com/dmk_bo2k8.ppt

Trust: 1.7

url:http://www.nominum.com/asset_upload_file741_2661.pdf

Trust: 1.7

url:http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html

Trust: 1.7

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037

Trust: 1.7

url:http://www.openbsd.org/errata42.html#013_bind

Trust: 1.7

url:http://www.openbsd.org/errata43.html#004_bind

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12117

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5725

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5761

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5917

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9627

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2008-0533.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2008-0789.html

Trust: 1.7

url:http://www.securitytracker.com/id?1020437

Trust: 1.7

url:http://www.securitytracker.com/id?1020438

Trust: 1.7

url:http://www.securitytracker.com/id?1020440

Trust: 1.7

url:http://www.securitytracker.com/id?1020448

Trust: 1.7

url:http://www.securitytracker.com/id?1020449

Trust: 1.7

url:http://www.securitytracker.com/id?1020548

Trust: 1.7

url:http://www.securitytracker.com/id?1020558

Trust: 1.7

url:http://www.securitytracker.com/id?1020560

Trust: 1.7

url:http://www.securitytracker.com/id?1020561

Trust: 1.7

url:http://www.securitytracker.com/id?1020575

Trust: 1.7

url:http://www.securitytracker.com/id?1020576

Trust: 1.7

url:http://www.securitytracker.com/id?1020577

Trust: 1.7

url:http://www.securitytracker.com/id?1020578

Trust: 1.7

url:http://www.securitytracker.com/id?1020579

Trust: 1.7

url:http://www.securitytracker.com/id?1020651

Trust: 1.7

url:http://www.securitytracker.com/id?1020653

Trust: 1.7

url:http://www.securitytracker.com/id?1020702

Trust: 1.7

url:http://www.securitytracker.com/id?1020802

Trust: 1.7

url:http://www.securitytracker.com/id?1020804

Trust: 1.7

url:http://secunia.com/advisories/30925

Trust: 1.7

url:http://secunia.com/advisories/30973

Trust: 1.7

url:http://secunia.com/advisories/30977

Trust: 1.7

url:http://secunia.com/advisories/30979

Trust: 1.7

url:http://secunia.com/advisories/30980

Trust: 1.7

url:http://secunia.com/advisories/30988

Trust: 1.7

url:http://secunia.com/advisories/30989

Trust: 1.7

url:http://secunia.com/advisories/30998

Trust: 1.7

url:http://secunia.com/advisories/31011

Trust: 1.7

url:http://secunia.com/advisories/31012

Trust: 1.7

url:http://secunia.com/advisories/31014

Trust: 1.7

url:http://secunia.com/advisories/31019

Trust: 1.7

url:http://secunia.com/advisories/31022

Trust: 1.7

url:http://secunia.com/advisories/31030

Trust: 1.7

url:http://secunia.com/advisories/31031

Trust: 1.7

url:http://secunia.com/advisories/31033

Trust: 1.7

url:http://secunia.com/advisories/31052

Trust: 1.7

url:http://secunia.com/advisories/31065

Trust: 1.7

url:http://secunia.com/advisories/31072

Trust: 1.7

url:http://secunia.com/advisories/31093

Trust: 1.7

url:http://secunia.com/advisories/31094

Trust: 1.7

url:http://secunia.com/advisories/31137

Trust: 1.7

url:http://secunia.com/advisories/31143

Trust: 1.7

url:http://secunia.com/advisories/31151

Trust: 1.7

url:http://secunia.com/advisories/31152

Trust: 1.7

url:http://secunia.com/advisories/31153

Trust: 1.7

url:http://secunia.com/advisories/31169

Trust: 1.7

url:http://secunia.com/advisories/31197

Trust: 1.7

url:http://secunia.com/advisories/31199

Trust: 1.7

url:http://secunia.com/advisories/31204

Trust: 1.7

url:http://secunia.com/advisories/31207

Trust: 1.7

url:http://secunia.com/advisories/31209

Trust: 1.7

url:http://secunia.com/advisories/31212

Trust: 1.7

url:http://secunia.com/advisories/31213

Trust: 1.7

url:http://secunia.com/advisories/31221

Trust: 1.7

url:http://secunia.com/advisories/31236

Trust: 1.7

url:http://secunia.com/advisories/31237

Trust: 1.7

url:http://secunia.com/advisories/31254

Trust: 1.7

url:http://secunia.com/advisories/31326

Trust: 1.7

url:http://secunia.com/advisories/31354

Trust: 1.7

url:http://secunia.com/advisories/31422

Trust: 1.7

url:http://secunia.com/advisories/31430

Trust: 1.7

url:http://secunia.com/advisories/31451

Trust: 1.7

url:http://secunia.com/advisories/31482

Trust: 1.7

url:http://secunia.com/advisories/31495

Trust: 1.7

url:http://secunia.com/advisories/31588

Trust: 1.7

url:http://secunia.com/advisories/31687

Trust: 1.7

url:http://secunia.com/advisories/31823

Trust: 1.7

url:http://secunia.com/advisories/31882

Trust: 1.7

url:http://secunia.com/advisories/31900

Trust: 1.7

url:http://secunia.com/advisories/33178

Trust: 1.7

url:http://secunia.com/advisories/33714

Trust: 1.7

url:http://secunia.com/advisories/33786

Trust: 1.7

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1

Trust: 1.7

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-622-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-627-1

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2019/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2023/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2025/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2029/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2030/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2050/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2051/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2052/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2055/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2092/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2113/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2114/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2123/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2139/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2166/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2195/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2196/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2197/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2268

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2291

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2334

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2342

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2377

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2383

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2384

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2466

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2467

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2482

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2525

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2549

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2558

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2582

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2584

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/0297

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/0311

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/0622

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43637

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43334

Trust: 1.7

url:http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience

Trust: 1.6

url:http://tools.ietf.org/html/rfc3833

Trust: 1.6

url:http://tools.ietf.org/html/rfc2827

Trust: 1.6

url:http://tools.ietf.org/html/rfc3704

Trust: 1.6

url:http://tools.ietf.org/html/draft-ietf-tsvwg-port-randomization

Trust: 1.6

url:http://www.ipcop.org/index.php?name=news&file=article&sid=40

Trust: 1.6

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=762152

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141879471518471&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=123324863916385&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=121866517322103&w=2

Trust: 1.6

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680

Trust: 1.6

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=121630706004256&w=2

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2008-1447

Trust: 1.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1447

Trust: 1.2

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2008-009.txt.asc

Trust: 1.1

url:http://csrc.nist.gov/publications/nistpubs/800-81/sp800-81.pdf

Trust: 0.8

url:http://tools.ietf.org/html/rfc3013

Trust: 0.8

url:http://tools.ietf.org/html/rfc4033

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_random.html

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_transmit.html

Trust: 0.8

url:http://cr.yp.to/djbdns/forgery.html

Trust: 0.8

url:http://www.trusteer.com/microsoftdns

Trust: 0.8

url:http://www.trusteer.com/bind9dns

Trust: 0.8

url:http://www.trusteer.com/bind8dns

Trust: 0.8

url:http://www.sans.org/reading_room/whitepapers/dns/1567.php

Trust: 0.8

url:http://blogs.iss.net/archive/morednsnat.html

Trust: 0.8

url:https://jvn.jp/cert/jvnvu800113/

Trust: 0.8

url:http://www.cert.at/static/cert.at-0802-dns-patchanalysis.pdf

Trust: 0.8

url:http://www.dimap.ufrn.br/

Trust: 0.8

url:http://www.icir.org/vern/imw-2002/imw2002-papers/198.pdf

Trust: 0.8

url:http://razor.bindview.com/publish/papers/tcpseq.html

Trust: 0.8

url:http://mathworld.wolfram.com/birthdayproblem.html

Trust: 0.8

url:http://mathworld.wolfram.com/birthdayattack.html

Trust: 0.8

url:http://www.securityfocus.com/guest/17905

Trust: 0.8

url:http://www.rnp.br/cais/alertas/2002/cais-alr-19112002a.html

Trust: 0.8

url:http://www.rnp.br/cais_en/

Trust: 0.8

url:http://www.cert.org/advisories/ca-1997-22.html

Trust: 0.8

url:http://www.cert.org/advisories/ca-2001-09.html

Trust: 0.8

url:http://www.cert.org/archive/pdf/dns.pdf

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2019

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2055

Trust: 0.8

url:http://www.ipa.go.jp/security/vuln/documents/2008/200812_dns.html

Trust: 0.8

url:http://www.ipa.go.jp/security/vuln/documents/2009/200912_dns.html

Trust: 0.8

url:http://www.ipa.go.jp/security/vuln/documents/2008/200809_dns.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2008/at080013.txt

Trust: 0.8

url:https://www.jpcert.or.jp/at/2008/at080014.txt

Trust: 0.8

url:https://www.jpcert.or.jp/at/2014/at140016.html

Trust: 0.8

url:http://jprs.jp/tech/security/2014-04-15-portrandomization.html

Trust: 0.8

url:http://jprs.jp/tech/security/2014-05-30-poisoning-countermeasure-auth-1.pdf

Trust: 0.8

url:http://jvn.jp/cert/jvnvu800113/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-190a/

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-190b/

Trust: 0.8

url:http://jvn.jp/tr/trta08-190a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-190b/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1447

Trust: 0.8

url:http://secunia.com/advisories/30925/

Trust: 0.8

url:http://secunia.com/advisories/31014/

Trust: 0.8

url:http://secunia.com/advisories/30980/

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-190a.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2009/20090212_155349.html

Trust: 0.8

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.4

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.4

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.3

url:http://bugs.gentoo.org.

Trust: 0.3

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.3

url:http://security.gentoo.org/

Trust: 0.3

url:http://www.debian.org/security/faq

Trust: 0.3

url:http://security.debian.org/

Trust: 0.3

url:http://www.debian.org/security/

Trust: 0.3

url:http://packages.debian.org/<pkg>

Trust: 0.3

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://software.hp.com

Trust: 0.2

url:https://www.hp.com/go/swa

Trust: 0.2

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&amp;id=762152

Trust: 0.1

url:http://www.ipcop.org/index.php?name=news&amp;file=article&amp;sid=40

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=123324863916385&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=141879471518471&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121866517322103&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121630706004256&amp;w=2

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.539239

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.452680

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_i386.deb

Trust: 0.1

url:http://security.freebsd.org/patches/sa-08:06/bind7.patch.asc

Trust: 0.1

url:http://security.freebsd.org/patches/sa-08:06/bind63.patch

Trust: 0.1

url:http://security.freebsd.org/>.

Trust: 0.1

url:http://security.freebsd.org/patches/sa-08:06/bind63.patch.asc

Trust: 0.1

url:http://security.freebsd.org/patches/sa-08:06/bind7.patch

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/liblwres9_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.3.4-2etch3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind9-0_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libdns22_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/bind9-doc_9.3.4-2etch3_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisccfg1_9.3.4-2etch3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/b/bind9/libisc11_9.3.4-2etch3_hppa.deb

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/bind-9.4.2-39.2.src.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-chrootenv-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-chrootenv-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-utils-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/bind-9.4.1.p1-12.5.src.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-devel-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-devel-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-doc-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-doc-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/bind-libs-32bit-9.4.2-39.2.x86_64.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-utils-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/bind-libs-32bit-9.4.1.p1-12.5.x86_64.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-libs-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-libs-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2376

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2662

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2376

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3655

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3905

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2663

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2664

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2662

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3657

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3656

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2663

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2664

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3655

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3905

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2725

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2725

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3656

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3657

Trust: 0.1

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&

Trust: 0.1

url:http://software.hp.com/portal/swdepot/displayproductinfo.do?productnumber=b6834aa

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/457875)

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200809-02.xml

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3350

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3350

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/800113>

Trust: 0.1

url:http://tools.ietf.org/html/rfc3704>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/252735>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/927905>

Trust: 0.1

url:http://tools.ietf.org/html/rfc2827>

Trust: 0.1

url:http://tools.ietf.org/html/rfc3013>

Trust: 0.1

url:http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/484649>

Trust: 0.1

url:http://www.isc.org/sw/bind/bind-security.php>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-190b.html>

Trust: 0.1

url:http://tools.ietf.org/html/rfc3833>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/457875>

Trust: 0.1

url:http://itrc.hp.com

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.diff.gz

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#457875 // VULHUB: VHN-31572 // JVNDB: JVNDB-2008-001495 // PACKETSTORM: 74443 // PACKETSTORM: 68412 // PACKETSTORM: 68129 // PACKETSTORM: 68183 // PACKETSTORM: 68036 // PACKETSTORM: 68118 // PACKETSTORM: 68360 // PACKETSTORM: 73060 // PACKETSTORM: 46512 // PACKETSTORM: 69643 // PACKETSTORM: 68061 // PACKETSTORM: 68037 // PACKETSTORM: 96747 // PACKETSTORM: 68546 // CNNVD: CNNVD-200807-129 // NVD: CVE-2008-1447

CREDITS

Dan Kaminsky

Trust: 0.6

sources: CNNVD: CNNVD-200807-129

SOURCES

db:CERT/CCid:VU#800113
db:CERT/CCid:VU#457875
db:VULHUBid:VHN-31572
db:JVNDBid:JVNDB-2008-001495
db:PACKETSTORMid:74443
db:PACKETSTORMid:68412
db:PACKETSTORMid:68129
db:PACKETSTORMid:68183
db:PACKETSTORMid:68036
db:PACKETSTORMid:68118
db:PACKETSTORMid:68360
db:PACKETSTORMid:73060
db:PACKETSTORMid:46512
db:PACKETSTORMid:69643
db:PACKETSTORMid:68061
db:PACKETSTORMid:68037
db:PACKETSTORMid:96747
db:PACKETSTORMid:68546
db:CNNVDid:CNNVD-200807-129
db:NVDid:CVE-2008-1447

LAST UPDATE DATE

2024-11-21T20:42:22.761000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#800113date:2014-04-14T00:00:00
db:CERT/CCid:VU#457875date:2004-10-18T00:00:00
db:VULHUBid:VHN-31572date:2020-03-24T00:00:00
db:JVNDBid:JVNDB-2008-001495date:2014-06-02T00:00:00
db:CNNVDid:CNNVD-200807-129date:2020-03-25T00:00:00
db:NVDid:CVE-2008-1447date:2020-03-24T18:19:46.383

SOURCES RELEASE DATE

db:CERT/CCid:VU#800113date:2008-07-08T00:00:00
db:CERT/CCid:VU#457875date:2002-11-19T00:00:00
db:VULHUBid:VHN-31572date:2008-07-08T00:00:00
db:JVNDBid:JVNDB-2008-001495date:2008-07-23T00:00:00
db:PACKETSTORMid:74443date:2009-01-29T21:47:08
db:PACKETSTORMid:68412date:2008-07-22T18:01:41
db:PACKETSTORMid:68129date:2008-07-11T22:09:49
db:PACKETSTORMid:68183date:2008-07-15T02:48:11
db:PACKETSTORMid:68036date:2008-07-10T06:16:23
db:PACKETSTORMid:68118date:2008-07-11T22:04:56
db:PACKETSTORMid:68360date:2008-07-21T19:44:10
db:PACKETSTORMid:73060date:2008-12-16T21:29:31
db:PACKETSTORMid:46512date:2006-05-22T06:59:00
db:PACKETSTORMid:69643date:2008-09-04T22:22:48
db:PACKETSTORMid:68061date:2008-07-10T07:07:50
db:PACKETSTORMid:68037date:2008-07-10T06:23:57
db:PACKETSTORMid:96747date:2010-12-16T23:46:15
db:PACKETSTORMid:68546date:2008-07-28T15:27:39
db:CNNVDid:CNNVD-200807-129date:2008-07-08T00:00:00
db:NVDid:CVE-2008-1447date:2008-07-08T23:41:00