ID

VAR-200707-0675


CVE

CVE-2008-1447


TITLE

Multiple DNS implementations vulnerable to cache poisoning

Trust: 0.8

sources: CERT/CC: VU#800113

DESCRIPTION

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug.". plural DNS There is a vulnerability in the implementation that makes cache poisoning attacks easier. Recent research has found a more efficient method of cash poisoning than previously known. DNS As a cache server, PC Please note that there is a possibility of attack. Cash poisoning attack forged response This is done by sending a packet. query The source port of the packet query By changing the value randomly every time, the probability of a successful cache poisoning attack can be reduced.By cash poisoning attack DNS Fake cache server DNS Information can be cached and DNS Nodes using the cache server may be directed to fake sites. ISC (Internet Systems Consortiuim) BIND generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Advisory: Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks Advisory ID: cisco-sa-20080708-dns http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml Revision 1.0 For Public Release 2008 July 08 1800 UTC (GMT) Summary ======= Multiple Cisco products are vulnerable to DNS cache poisoning attacks due to their use of insufficiently randomized DNS transaction IDs and UDP source ports in the DNS queries that they produce, which may allow an attacker to more easily forge DNS answers that can poison DNS caches. To exploit this vulnerability an attacker must be able to cause a vulnerable DNS server to perform recursive DNS queries. Therefore, DNS servers that are only authoritative, or servers where recursion is not allowed, are not affected. Cisco has released free software updates that address this vulnerability. This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml. This security advisory is being published simultaneously with announcements from other affected organizations. Products that process DNS messages with the RD flag set will attempt to answer the question asked on behalf of the client. A product is only affected if using a vulnerable implementation of the DNS protocol, the DNS server functionality for the product is enabled, and the DNS feature for the product is configured to process recursive DNS query messages. Vulnerable Products +------------------ The following Cisco products are capable of acting as DNS servers and have been found to have the DNS implementation weakness that makes some types of DNS cache poisoning attacks more likely to succeed: * Cisco IOS Software A device that is running Cisco IOS Software will be affected if it is running a vulnerable version and if it is acting as a DNS server. All Cisco IOS Software releases that support the DNS server functionality and that have not had their DNS implementation improved are affected. For information about specific fixed versions, please refer to the Software Versions and Fixes section. A device that is running Cisco IOS Software is configured to act as a DNS server if the command "ip dns server" is present in the configuration. This command is not enabled by default. * Cisco Network Registrar All Cisco Network Registrar versions are affected, and DNS services are enabled by default. The DNS server on CNR is enabled via the command-line interface (CLI) commands "server dns enable start-on-reboot" or "dns enable start-on-reboot" or via the web management interface in the Servers page by selecting the appropriate "Start," "Stop," or "Reload" button. * Cisco Application and Content Networking System All Cisco Application and Content Networking System (ACNS) versions are affected; DNS services are disabled by default. ACNS is configured to act as a DNS server if the command "dns enable" is present in the configuration. * Cisco Global Site Selector Used in Combination with Cisco Network Registrar The Cisco Global Site Selector (GSS) is affected when it is used in combination with Cisco Network Registrar software to provide a more complete DNS solution. Fixed software would come in the form of an update of the Cisco Network Registrar software rather than an update of the GSS software. Products Confirmed Not Vulnerable +-------------------------------- Products that do not offer DNS server capabilities are not affected by this vulnerability. The Cisco GSS by itself is not affected by this vulnerability. However, it is affected when it is used with Cisco Network Registrar software. No other Cisco products are currently known to be affected by these vulnerabilities. Details ======= The Domain Name System is an integral part of networks that are based on TCP/IP such as the Internet. Simply stated, the Domain Name System is a hierarchical database that contains mappings of hostnames and IP addresses. When handling a query from a DNS client, a DNS server can look into its portion of the global DNS database (if the query is for a portion of the DNS database for which the DNS server is authoritative), or it can relay the query to other DNS servers (if it is configured to do so and if the query is for a portion of the DNS database for which the DNS server is not authoritative.) Because of the processing time and bandwidth that is associated with handling a DNS query, most DNS servers locally store responses that are received from other DNS servers. If this happens, a user who is trying to visit www.example.com may end up contacting the wrong web server. The fundamental implementation weakness is that the DNS transaction ID and source port number used to validate DNS responses are not sufficiently randomized and can easily be predicted, which allows an attacker to create forged responses to DNS queries that will match the expected values. The DNS server will consider such responses to be valid. The following Cisco products that offer DNS server functionality have been found to be susceptible to DNS cache poisoning attacks: * Cisco IOS Software: The vulnerability documented in Cisco bug ID CSCso81854. * Cisco Network Registrar: The vulnerability documented in Cisco bug ID CSCsq01298. * Cisco Application and Content Networking System (ACNS): The vulnerability documented in Cisco bug ID CSCsq21930. This vulnerability has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2008-1447. Vulnerability Scoring Details +---------------------------- Cisco has provided scores for the vulnerabilities in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security Advisory is done in accordance with CVSS version 2.0. CVSS is a standards-based scoring method that conveys vulnerability severity and helps determine urgency and priority of response. Cisco has provided a base and temporal score. Customers can then compute environmental scores to assist in determining the impact of the vulnerability in individual networks. Cisco has provided an FAQ to answer additional questions regarding CVSS at http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html Cisco has also provided a CVSS calculator to help compute the environmental impact for individual networks at http://intellishield.cisco.com/security/alertmanager/cvss Cisco Bugs: * DNS cache prone to poisoning/forged answers attacks (CSCsq21930) * DNS susceptible to forged query response attacks (CSCsq01298) * Need to make DNS implementation more resilient against forged answers (CSCso81854) CVSS Base Score - 6.4 Access Vector - Network Access Complexity - Low Authentication - None Confidentiality Impact - None Integrity Impact - Partial Availability Impact - Partial CVSS Temporal Score - 5.3 Exploitability - Functional Remediation Level - Official-Fix Report Confidence - Confirmed (same score for the three Cisco bugs listed above.) Impact ====== Successful exploitation of the vulnerability described in this document may result in invalid hostname-to-IP address mappings in the cache of an affected DNS server. This may lead users of this DNS server to contact the wrong provider of network services. The ultimate impact varies greatly, ranging from a simple denial of service (for example, making www.example.com resolve to 127.0.0.1) to phishing and financial fraud. Software Versions and Fixes =========================== When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution. In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance. Cisco IOS Software +----------------- Each row of the Cisco IOS Software table (below) names a Cisco IOS Software release train. If a given release train is vulnerable, then the earliest possible releases that contain the fix (along with the anticipated date of availability for each, if applicable) are listed in the "First Fixed Release" column of the table. The "Recommended Release" column indicates the releases which have fixes for all the published vulnerabilities at the time of this Advisory. A device running a release in the given train that is earlier than the release in a specific column (less than the First Fixed Release) is known to be vulnerable. Cisco recommends upgrading to a release equal to or later than the release in the "Recommended Releases" column of the table. +----------------------------------------+ | Major | Availability of | | Release | Repaired Releases | |------------+---------------------------| | Affected | First Fixed | Recommended | | 12.0-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | 12.0 | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0DA | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.0(7)DB | | | | are | | | | vulnerable, | 12.4(19a) | | 12.0DB | release | | | | 12.0(7)DB | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.0(7)DC | | | | are | | | | vulnerable, | 12.4(19a) | | 12.0DC | release | | | | 12.0(7)DC | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.0S | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SP | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0ST | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.0T | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.0W | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0WC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.0WT | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XD | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Note: | | | | Releases | | | | prior to | | | | 12.0(7)XE1 | | | | are | | | 12.0XE | vulnerable, | | | | release | | | | 12.0(7)XE1 | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.0XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.0(7)XK2 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.0XK | release | | | | 12.0(7)XK2 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.0XL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XM | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XN | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.0(7)XR1 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.0XR | release | | | | 12.0(7)XR1 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.0XS | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XW | Not | | | | Vulnerable | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.1-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.1 | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.1AA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1AX | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(22)AY1 | | | | are | | | 12.1AY | vulnerable, | 12.1(22) | | | release | EA11 | | | 12.1(22)AY1 | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.1AZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1CX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1DA | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(4)DB1 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.1DB | release | | | | 12.1(4)DB1 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(4)DC2 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.1DC | release | | | | 12.1(4)DC2 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.1E | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(11)EA1 | | | | are | | | 12.1EA | vulnerable, | 12.1(22) | | | release | EA11 | | | 12.1(11)EA1 | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.1EB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EO | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EW | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Note: | | | | Releases | | | | prior to | | | | 12.1(8a)EX | | | | are | | | 12.1EX | vulnerable, | | | | release | | | | 12.1(8a)EX | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.1EY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1GA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1GB | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.1T | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.1XA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XB | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(1)XC1 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.1XC | release | | | | 12.1(1)XC1 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.1XD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XM | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XN | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XO | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XP | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XR | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XS | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XT | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YD | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Note: | | | | Releases | | | | prior to | | | | 12.1(5)YE1 | | | | are | 12.4(19a) | | 12.1YE | vulnerable, | | | | release | 12.4(19b) | | | 12.1(5)YE1 | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.1YF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.2-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2 | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2B | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2BC | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2BW | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.2(8)BY | | | | are | | | | vulnerable, | 12.4(19a) | | 12.2BY | release | | | | 12.2(8)BY | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.2BZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2CX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2CY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2CZ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2DA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2DD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2DX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EWA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2FX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2FY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2FZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2JA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2JK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2MB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2MC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2S | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SBC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SCA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SED | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SGA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SM | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SO | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SRA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SRB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SRC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SVA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SVC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SVD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2T | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.2(8) | | | | TPC10d are | | | | vulnerable, | | | 12.2TPC | release | | | | 12.2(8) | | | | TPC10d and | | | | later are | | | | not | | | | vulnerable; | | |------------+-------------+-------------| | 12.2UZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XA | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XB | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XC | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2XD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XG | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2XH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XK | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XL | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2XM | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XN | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XNA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XO | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XR | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XS | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XT | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XU | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2XV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YH | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YJ | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2YK | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YL | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YM | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YN | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.2(18) | | | migrate to | SXF15; | | 12.2YO | any release | Available | | | in 12.2SY | on | | | | 08-AUG-08 | |------------+-------------+-------------| | 12.2YP | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YR | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YS | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YT | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YU | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YV | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2YW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZA | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2ZB | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2ZC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZD | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2ZE | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2ZF | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.2ZG | first fixed | | | | in 12.4T | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.2ZH | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2ZJ | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.2ZL | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.2ZP | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZYA | Not | | | | Vulnerable | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.3-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3 | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3B | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3BC | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3BW | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3EU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JEA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JEB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JEC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JX | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3T | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3TPC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.3VA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XA | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XB | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XC | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XD | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XE | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XF | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XG | first fixed | | | | in 12.4T | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XH | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3XI | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | | 12.3(14) | | | | YX12 | | | Vulnerable; | | | 12.3XJ | first fixed | 12.4(20)T; | | | in 12.3YX | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XK | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XQ | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XR | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XS | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3XU | Not | | | | Vulnerable | | |------------+-------------+-------------| | | | 12.3(14) | | | | YX12 | | | Vulnerable; | | | 12.3XW | first fixed | 12.4(20)T; | | | in 12.3YX | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.3XY | Not | | | | Vulnerable | | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3YA | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YD | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | | 12.3(14) | | | | YX12 | | | Vulnerable; | | | 12.3YF | first fixed | 12.4(20)T; | | | in 12.3YX | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YG | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YH | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YI | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.3YJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YK | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.3(14) | | | | YM12 are | | | | vulnerable, | 12.3(14) | | 12.3YM | release | YM12 | | | 12.3(14) | | | | YM12 and | | | | later are | | | | not | | | | vulnerable; | | |------------+-------------+-------------| | 12.3YQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YS | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YT | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YU | first fixed | | | | in 12.4XB | | |------------+-------------+-------------| | 12.3YX | 12.3(14) | 12.3(14) | | | YX12 | YX12 | |------------+-------------+-------------| | 12.3YZ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.4-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | 12.4(18b) | | | | | | | | 12.4(19a) | 12.4(19a) | | 12.4 | | | | | 12.4(19b) | 12.4(19b) | | | | | | | 12.4(21) | | |------------+-------------+-------------| | 12.4JA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JMA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JMB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JMC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4MD | 12.4(15)MD | 12.4(15)MD | |------------+-------------+-------------| | 12.4MR | 12.4(19)MR | 12.4(19)MR | |------------+-------------+-------------| | 12.4SW | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | 12.4(15)T6 | | | | | 12.4(20)T; | | 12.4T | 12.4(20)T; | Available | | | Available | on | | | on | 11-JUL-08 | | | 11-JUL-08 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.4XA | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.4XB | 12.4(2)XB10 | | |------------+-------------+-------------| | 12.4XC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | 12.4(4) | 12.4(20)T; | | | XD11; | Available | | 12.4XD | Available | on | | | on | 11-JUL-08 | | | 31-JUL-08 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.4XE | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.4XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4XG | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.4XJ | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.4XK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4XL | 12.4(15)XL2 | 12.4(15)XL2 | |------------+-------------+-------------| | 12.4XM | 12.4(15)XM1 | 12.4(15)XM1 | |------------+-------------+-------------| | 12.4XN | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4XQ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4XT | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4XV | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4XW | 12.4(11)XW8 | 12.4(11)XW6 | |------------+-------------+-------------| | 12.4XY | 12.4(15)XY3 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.4XZ | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | +----------------------------------------+ Cisco Network Registrar +---------------------- +---------------------------------------+ | Affected | | | Release | First Fixed Release | | Train | | |--------------+------------------------| | 6.1.x | Contact TAC | |--------------+------------------------| | | 6.3.1.1 patch; | | 6.3.x | available mid-July | | | 2008 | |--------------+------------------------| | 7.0.x | 7.0.1; available in | | | mid-July 2008 | +---------------------------------------+ Cisco Network Registrar software is available for download at: http://www.cisco.com/pcgi-bin/Software/Tablebuild/tablebuild.pl/nr-eval Cisco Application and Content Networking System +---------------------------------------------- This issue is fixed in version 5.5.11 of Cisco ACNS software. This release will be available for download from www.cisco.com in late July 2008. Cisco ACNS 5.5 software is available for download at: http://www.cisco.com/pcgi-bin/tablebuild.pl/acns55 Workarounds =========== There are no workarounds. Additional information about identification and mitigation of attacks against DNS is in the Cisco Applied Intelligence white paper "DNS Best Practices, Network Protections, and Attack Identification," available at http://www.cisco.com/web/about/security/intelligence/dns-bcp.html. Obtaining Fixed Software ======================== Cisco has released free software updates that address these vulnerabilities. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment. Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html, or as otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw-center/sw-usingswc.shtml. Do not contact psirt@cisco.com or security-alert@cisco.com for software upgrades. Customers with Service Contracts +------------------------------- Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com. Customers using Third Party Support Organizations +------------------------------------------------ Customers whose Cisco products are provided or maintained through prior or existing agreements with third-party support organizations, such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory. The effectiveness of any workaround or fix is dependent on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed. Customers without Service Contracts +---------------------------------- Customers who purchase direct from Cisco but do not hold a Cisco service contract, and customers who purchase through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows. * +1 800 553 2447 (toll free from within North America) * +1 408 526 7209 (toll call from anywhere in the world) * e-mail: tac@cisco.com Customers should have their product serial number available and be prepared to give the URL of this notice as evidence of entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC. Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional TAC contact information, including localized telephone numbers, and instructions and e-mail addresses for use in various languages. Exploitation and Public Announcements ===================================== The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory. Cisco would like to thank Dan Kaminsky for notifying vendors about his findings. Note that vulnerability information for Cisco IOS Software is being provided in this advisory outside of the announced publication schedule for Cisco IOS Software described at http://www.cisco.com/go/psirt due to industry-wide disclosure of the vulnerability. Status of this Notice: FINAL ============================ THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors. Distribution ============ This advisory is posted on Cisco's worldwide website at http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients. * cust-security-announce@cisco.com * first-teams@first.org * bugtraq@securityfocus.com * vulnwatch@vulnwatch.org * cisco@spot.colorado.edu * cisco-nsp@puck.nether.net * full-disclosure@lists.grok.org.uk * comp.dcom.sys.cisco@newsgate.cisco.com Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates. Revision History ================ +-----------------------------------------------------------+ | Revision 1.0 | 2008-July-08 | Initial public release | +-----------------------------------------------------------+ Cisco Security Procedures ========================= Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt. +-------------------------------------------------------------------- Copyright 2007-2008 Cisco Systems, Inc. All rights reserved. +-------------------------------------------------------------------- Updated: Jul 08, 2008 Document ID: 107064 +-------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkhztUIACgkQ86n/Gc8U/uCAgACfVRRoJO4w4defnpwbNlfgBm4t 2SMAnjKCKECHtsjN9umqqPrPd2DW4IcC =XGZw -----END PGP SIGNATURE----- . This could be used to misdirect users and services; i.e. This update provides the latest stable BIND releases for all platforms except Corporate Server/Desktop 3.0 and MNF2, which have been patched to correct the issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.1: 73cc24fc9586b7ab290d755012c16a79 2007.1/i586/bind-9.4.2-0.1mdv2007.1.i586.rpm 70867c50cfd64b4406aa002d627d740b 2007.1/i586/bind-devel-9.4.2-0.1mdv2007.1.i586.rpm 3603e9d9115466753397a1f472011703 2007.1/i586/bind-utils-9.4.2-0.1mdv2007.1.i586.rpm cf5e4100ecb21a4eb603831e5a6ec23d 2007.1/SRPMS/bind-9.4.2-0.1mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: 4eb7ce0984d3ce3befff667392e3bf3e 2007.1/x86_64/bind-9.4.2-0.1mdv2007.1.x86_64.rpm d7b9a9e7d4c52a5b0c54f59ca20bf2d5 2007.1/x86_64/bind-devel-9.4.2-0.1mdv2007.1.x86_64.rpm c5c66c9609615029d2f07f7b09a63118 2007.1/x86_64/bind-utils-9.4.2-0.1mdv2007.1.x86_64.rpm cf5e4100ecb21a4eb603831e5a6ec23d 2007.1/SRPMS/bind-9.4.2-0.1mdv2007.1.src.rpm Mandriva Linux 2008.0: 52dfe3970fcd9495b2bb9379a9312b25 2008.0/i586/bind-9.4.2-1mdv2008.0.i586.rpm 97d20d35b6814aa2f9fab549ca6237c0 2008.0/i586/bind-devel-9.4.2-1mdv2008.0.i586.rpm 87a7bb3dd25abd8cd882a8f2fdc2398e 2008.0/i586/bind-utils-9.4.2-1mdv2008.0.i586.rpm da4444a8074e6ede39dfa557fb258db7 2008.0/SRPMS/bind-9.4.2-1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: b9d0337363bc1e2b14505f25d4ee5f99 2008.0/x86_64/bind-9.4.2-1mdv2008.0.x86_64.rpm 9b75e2a96784c00c2912bc3bf333d089 2008.0/x86_64/bind-devel-9.4.2-1mdv2008.0.x86_64.rpm 0a593b090d9e6bda3666e234056e19ba 2008.0/x86_64/bind-utils-9.4.2-1mdv2008.0.x86_64.rpm da4444a8074e6ede39dfa557fb258db7 2008.0/SRPMS/bind-9.4.2-1mdv2008.0.src.rpm Mandriva Linux 2008.1: 2534ef007262d4ea2d219bab0190466c 2008.1/i586/bind-9.5.0-3mdv2008.1.i586.rpm c3feee5d05aa3aee14cd70a2d295d0b1 2008.1/i586/bind-devel-9.5.0-3mdv2008.1.i586.rpm f306c06665b723a2530258e6d1dbdae2 2008.1/i586/bind-doc-9.5.0-3mdv2008.1.i586.rpm 967ef80628f92160930bc3a3827a216e 2008.1/i586/bind-utils-9.5.0-3mdv2008.1.i586.rpm 70fc7a7964944a2926979710c5148ed1 2008.1/SRPMS/bind-9.5.0-3mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 3f4d96d7a7f913c141e1f63cdc7e7336 2008.1/x86_64/bind-9.5.0-3mdv2008.1.x86_64.rpm 420db658366763686198f41394aa72b3 2008.1/x86_64/bind-devel-9.5.0-3mdv2008.1.x86_64.rpm 6f3674f68311494c5a9ff0dbce831e82 2008.1/x86_64/bind-doc-9.5.0-3mdv2008.1.x86_64.rpm 4294b3a086b89bf53c5c967c17962447 2008.1/x86_64/bind-utils-9.5.0-3mdv2008.1.x86_64.rpm 70fc7a7964944a2926979710c5148ed1 2008.1/SRPMS/bind-9.5.0-3mdv2008.1.src.rpm Corporate 3.0: de2a4372d1c25d73f343c9fcb044c9dd corporate/3.0/i586/bind-9.2.3-6.5.C30mdk.i586.rpm 1f24f6dbdb6c02e21cbbef99555049cb corporate/3.0/i586/bind-devel-9.2.3-6.5.C30mdk.i586.rpm 00405b98290d5a41f226081baa57e18d corporate/3.0/i586/bind-utils-9.2.3-6.5.C30mdk.i586.rpm 6a237dc290f4f7c463b1996e6a4a4515 corporate/3.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm Corporate 3.0/X86_64: 628162f3d6a414828d2231fefc46842b corporate/3.0/x86_64/bind-9.2.3-6.5.C30mdk.x86_64.rpm dd29ff31a9cffcc1b20fd045869d7013 corporate/3.0/x86_64/bind-devel-9.2.3-6.5.C30mdk.x86_64.rpm c475c1a4d048e04da1fc27dcbb17c3f3 corporate/3.0/x86_64/bind-utils-9.2.3-6.5.C30mdk.x86_64.rpm 6a237dc290f4f7c463b1996e6a4a4515 corporate/3.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm Corporate 4.0: 271ead204904be302d197cd542f5ae23 corporate/4.0/i586/bind-9.3.5-0.4.20060mlcs4.i586.rpm 42413dcc1cf053e735216f767eff4e5d corporate/4.0/i586/bind-devel-9.3.5-0.4.20060mlcs4.i586.rpm 0201afe493a41e1deedc9bf7e9725f4a corporate/4.0/i586/bind-utils-9.3.5-0.4.20060mlcs4.i586.rpm 86bc0cdc9ed1b959b6f56e0660268f2e corporate/4.0/SRPMS/bind-9.3.5-0.4.20060mlcs4.src.rpm Corporate 4.0/X86_64: b1a18a7d0578dab7bd825eda6c682b3d corporate/4.0/x86_64/bind-9.3.5-0.4.20060mlcs4.x86_64.rpm 6a2ebd550feb9147058de05b1a1ef04d corporate/4.0/x86_64/bind-devel-9.3.5-0.4.20060mlcs4.x86_64.rpm 670a1b934ce4974b8505018ab69ade0b corporate/4.0/x86_64/bind-utils-9.3.5-0.4.20060mlcs4.x86_64.rpm 86bc0cdc9ed1b959b6f56e0660268f2e corporate/4.0/SRPMS/bind-9.3.5-0.4.20060mlcs4.src.rpm Multi Network Firewall 2.0: 5b694c24cc2092e38f531dbfdd5c9d41 mnf/2.0/i586/bind-9.2.3-6.5.C30mdk.i586.rpm c08bc805027059c47bed32215f17eacb mnf/2.0/i586/bind-utils-9.2.3-6.5.C30mdk.i586.rpm 39225289516498e1b071c5059306f2b9 mnf/2.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-1619-2 security@debian.org http://www.debian.org/security/ Devin Carraway September 22, 2008 http://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : python-dns Vulnerability : DNS response spoofing Problem type : remote Debian-specific: no CVE Id(s) : CVE-2008-1447 Debian Bug : 490217 In DSA-1619-1, an update was announced for DNS response spoofing vulnerabilities in python-dns. The fix introduced a regression in the library breaking the resolution of UTF-8 encoded record names. An updated release is available which corrects this problem. For reference, the original advisory text follows. Multiple weaknesses have been identified in PyDNS, a DNS client implementation for the Python language. Scott Kitterman noted that python-dns is vulnerable to this predictability, as it randomizes neither its transaction ID nor its source port. Taken together, this lack of entropy leaves applications using python-dns to perform DNS queries highly susceptible to response forgery. For the stable distribution (etch), these problems have been fixed in version 2.3.0-5.2+etch2. We recommend that you upgrade your python-dns package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - ------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.diff.gz Size/MD5 checksum: 3807 4c9dceefe0dfc4ee933f3c9298764153 http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz Size/MD5 checksum: 21084 82d377c6a59181072b30b0da4e9835b8 http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.dsc Size/MD5 checksum: 695 16b84a9d56bdd4baf5cdf1bf7e413521 Architecture independent packages: http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2_all.deb Size/MD5 checksum: 22972 59775332c3bb11b1408c83cf25b8e253 These files will probably be moved into the stable distribution on its next update. Impact ====== An attacker could exploit the second weakness to poison the cache of pdnsd and thus spoof DNS traffic, which could e.g. The first issue can be exploited by enticing pdnsd to send a query to a malicious DNS server, or using the port randomization weakness, and might lead to a Denial of Service. Workaround ========== Port randomization can be enabled by setting the "query_port_start" option to 1024 which would resolve the CVE-2008-1447 issue. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. These vulnerabilities could be remotely exploited to cause a Denial of Service (DoS) and other vulnerabilities. No update is required for BIND clients. HP TCP/IP Services for OpenVMS 5.7 ECO5 package is available from the following location: The HP TCP/IP Services for OpenVMS 5.7 ECO5 kits for both Integrity and Alpha platforms have been uploaded to HP Support Center website. Customers can access the kits from Patch Management page. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200812-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Ruby: Multiple vulnerabilities Date: December 16, 2008 Bugs: #225465, #236060 ID: 200812-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in Ruby that allow for attacks including arbitrary code execution and Denial of Service. Background ========== Ruby is an interpreted object-oriented programming language. The elaborate standard library includes an HTTP server ("WEBRick") and a class for XML parsing ("REXML"). Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-lang/ruby < 1.8.6_p287-r1 >= 1.8.6_p287-r1 Description =========== Multiple vulnerabilities have been discovered in the Ruby interpreter and its standard libraries. Drew Yao of Apple Product Security discovered the following flaws: * Arbitrary code execution or Denial of Service (memory corruption) in the rb_str_buf_append() function (CVE-2008-2662). * Arbitrary code execution or Denial of Service (memory corruption) in the rb_ary_stor() function (CVE-2008-2663). * Memory corruption via alloca in the rb_str_format() function (CVE-2008-2664). * Memory corruption ("REALLOC_N") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2725). * Memory corruption ("beg + rlen") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2726). Furthermore, several other vulnerabilities have been reported: * Tanaka Akira reported an issue with resolv.rb that enables attackers to spoof DNS responses (CVE-2008-1447). * Akira Tagoh of RedHat discovered a Denial of Service (crash) issue in the rb_ary_fill() function in array.c (CVE-2008-2376). * Several safe level bypass vulnerabilities were discovered and reported by Keita Yamaguchi (CVE-2008-3655). * Christian Neukirchen is credited for discovering a Denial of Service (CPU consumption) attack in the WEBRick HTTP server (CVE-2008-3656). * A fault in the dl module allowed the circumvention of taintness checks which could possibly lead to insecure code execution was reported by "sheepman" (CVE-2008-3657). * Luka Treiber and Mitja Kolsek (ACROS Security) disclosed a Denial of Service (CPU consumption) vulnerability in the REXML module when dealing with recursive entity expansion (CVE-2008-3790). Impact ====== These vulnerabilities allow remote attackers to execute arbitrary code, spoof DNS responses, bypass Ruby's built-in security and taintness checks, and cause a Denial of Service via crash or CPU exhaustion. Workaround ========== There is no known workaround at this time. Resolution ========== All Ruby users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p287-r1" References ========== [ 1 ] CVE-2008-1447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 [ 2 ] CVE-2008-2376 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376 [ 3 ] CVE-2008-2662 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662 [ 4 ] CVE-2008-2663 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663 [ 5 ] CVE-2008-2664 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664 [ 6 ] CVE-2008-2725 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725 [ 7 ] CVE-2008-2726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726 [ 8 ] CVE-2008-3655 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655 [ 9 ] CVE-2008-3656 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656 [ 10 ] CVE-2008-3657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657 [ 11 ] CVE-2008-3790 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790 [ 12 ] CVE-2008-3905 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200812-17.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . Effective attack techniques against these vulnerabilities have been demonstrated. I. Tools and techniques have been developed that can reliably poison a domain of the attacker's choosing on most current implementations. As a result, the consensus of DNS software implementers is to implement source port randomization in their resolvers as a mitigation. US-CERT is tracking this issue as VU#800113. This reference number corresponds to CVE-2008-1447. II. Impact An attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control. III. Solution Apply a patch from your vendor Patches have been released by a number of vendors to implement source port randomization in the nameserver. Please see the Systems Affected section of Vulnerability Note VU#800113 for additional details for specific vendors. As mentioned above, stub resolvers are also vulnerable to these attacks. Stub resolvers that will issue queries in response to attacker behavior, and may receive packets from an attacker, should be patched. System administrators should be alert for patches to client operating systems that implement port randomization in the stub resolver. Workarounds Restrict access Administrators, particularly those who are unable to apply a patch, can limit exposure to this vulnerability by restricting sources that can ask for recursion. Note that restricting access will still allow attackers with access to authorized hosts to exploit this vulnerability. Filter traffic at network perimeters Because the ability to spoof IP addresses is necessary to conduct these attacks, administrators should take care to filter spoofed addresses at the network perimeter. IETF Request for Comments (RFC) documents RFC 2827, RFC 3704, and RFC 3013 describe best current practices (BCPs) for implementing this defense. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate. Run a local DNS cache In lieu of strong port randomization characteristics in a stub resolver, administrators can protect their systems by using local caching full-service resolvers, both on the client systems and on servers that are topologically close on the network to the client systems. This should be done in conjunction with the network segmentation and filtering strategies mentioned above. Disable recursion Disable recursion on any nameserver responding to DNS requests made by untrusted systems. Implement source port randomization Vendors that implement DNS software are encouraged to review IETF Internet Draft, "Measures for making DNS more resilient against forged answers," for additional information about implementing mitigations in their products. This document is a work in progress and may change prior to its publication as an RFC, if it is approved. IV. References * US-CERT Vulnerability Note VU#800113 - <http://www.kb.cert.org/vuls/id/800113> * US-CERT Vulnerability Note VU#484649 - <http://www.kb.cert.org/vuls/id/484649> * US-CERT Vulnerability Note VU#252735 - <http://www.kb.cert.org/vuls/id/252735> * US-CERT Vulnerability Note VU#927905 - <http://www.kb.cert.org/vuls/id/927905> * US-CERT Vulnerability Note VU#457875 - <http://www.kb.cert.org/vuls/id/457875> * Internet Draft: Measures for making DNS more resilient against forged answers - <http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience> * RFC 3833 - <http://tools.ietf.org/html/rfc3833> * RFC 2827 - <http://tools.ietf.org/html/rfc2827> * RFC 3704 - <http://tools.ietf.org/html/rfc3704> * RFC 3013 - <http://tools.ietf.org/html/rfc3013> * Microsoft Security Bulletin MS08-037 - <http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx> * Internet Systems Consortium BIND Vulnerabilities - <http://www.isc.org/sw/bind/bind-security.php> ____________________________________________________________________ US-CERT thanks Dan Kaminsky of IOActive and Paul Vixie of Internet Systems Consortium (ISC) for notifying us about this problem and for helping us to construct this advisory. ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA08-190B.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA08-190B Feedback VU#800113" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2008 by US-CERT, a government organization. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01503743 Version: 1 HPSBST02350 SSRT080102 rev.1 - Storage Management Appliance (SMA), Microsoft Patch Applicability MS08-037 to MS08-040 NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2008-07-14 Last Updated: 2008-07-14 Potential Security Impact: Please check the table below Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Various potential security vulnerabilities have been identified in Microsoft software that is running on the Storage Management Appliance (SMA). Some of these vulnerabilities may be pertinent to the SMA, please check the table in the Resolution section of this Security Bulletin. References: MS08-037 (CVE-2008-1447, CVE-2008-1454), MS08-038 (CVE-2008-1435), MS08-039 (CVE-2008-2247, CVE-2008-2248), MS08-040 (CVE-2008-0085, CVE-2008-0086, CVE-2008-0106, CVE-2008-0107). Storage Management Appliance v2.1 Software running on: Storage Management Appliance I Storage Management Appliance II Storage Management Appliance III BACKGROUND CVSS 2.0 Base Metrics =============================================== Reference Base Vector Base Score -- Not Applicable -- =============================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. Patches released by Microsoft after MS06-051 are covered by monthly Security Bulletins. For the full archived list of Microsoft security updates applicable for Storage Management Appliance software v2.1, please refer to the following Security Bulletins available on the IT Resource Center (ITRC) Web site: http://www.itrc.hp.com/service/cki/secBullArchive.do For patches released by Microsoft in 2003, MS03-001 to MS03-051 refer to Security Bulletin HPSBST02146 For patches released by Microsoft in 2004, MS04-001 to MS04-045 refer to Security Bulletin HPSBST02147 For patches released by Microsoft in 2005, MS05-001 to MS05-055 refer to Security Bulletin HPSBST02148 For patches released by Microsoft in 2006, MS06-001 to MS06-051 refer to Security Bulletin HPSBST02140 The Microsoft patch index archive and further details about all Microsoft patches can be found on the following Web site: http://www.microsoft.com/technet/security/bulletin/summary.mspx NOTE: The SMA must have all pertinent SMA Service Packs applied Windows 2000 Update Rollup 1 Customers are advised to download and install the Windows 2000 Update Rollup 1 for Service Pack 4 on SMA v2.1. For more information please refer to the Windows 2000 Update Rollup 1 for Service Pack 4 and Storage Management Appliance v2.1 advisory at the following website: http://h20000.www2.hp.com/bizsupport/TechSupport/DocumentIndex.jsp?contentType=SupportManual&lang=en&cc=us&docIndexId=179111&taskId=101&prodTypeId=12169&prodSeriesId=315667 Windows 2000 Update Rollup 1 for SP4 does not include security updates released after April 30, 2005 starting from MS05-026. It also does not include patches MS04-003 and MS04-028. Please install these patches in addition to Windows 2000 Update Rollup 1 for SP4, if they have not been installed already RESOLUTION HP strongly recommends the immediate installation of all security patches that apply to third party software which is integrated with SMA software products supplied by HP, and that patches are applied in accordance with an appropriate patch management policy. NOTE: Patch installation instructions are shown at the end of this table. ------------------------------------------------- MS Patch - MS08-037 Vulnerabilities in DNS Could Allow Spoofing (953230) Analysis - Patch will run successfully. Action - For SMA v2.1, customers should download patch from Microsoft and install. ------------------------------------------------- MS Patch - MS08-038 Vulnerability in Windows Explorer Could Allow Remote Code Execution (950582) Analysis - SMA does not have this component. Action - Patch will not run successfully. Customers should not be concerned with this issue ------------------------------------------------- MS Patch - MS08-039 Vulnerabilities in Outlook Web Access for Exchange Server Could Allow Elevation of Privilege (953747) Analysis - SMA does not have this component. Action - Patch will not run successfully. Customers should not be concerned with this issue ------------------------------------------------- MS Patch - MS08-040 Vulnerabilities in Microsoft SQL Server Could Allow Elevation of Privilege (941203) Analysis - SMA does not have this component. Action - Patch will not run successfully. Customers should not be concerned with this issue ------------------------------------------------- Installation Instructions: (if applicable) Download patches to a system other than the SMA Copy the patch to a floppy diskette or to a CD Execute the patch by using Terminal Services to the SMA or by attaching a keyboard, monitor and mouse to the SMA. Note: The Microsoft Windows Installer 3.1 is supported on SMA v2.1. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. At this time, it is not possible to implement the recommended countermeasures in the GNU libc stub resolver. Install a local BIND 9 resoler on the host, possibly in forward-only mode. (Other caching resolvers can be used instead.) 2. Rely on IP address spoofing protection if available. This DSA will be updated when patches for hardening the stub resolver are available. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Red Hat update for bind SECUNIA ADVISORY ID: SA26195 VERIFY ADVISORY: http://secunia.com/advisories/26195/ CRITICAL: Moderately critical IMPACT: Spoofing WHERE: >From remote OPERATING SYSTEM: Red Hat Enterprise Linux (v. 5 server) http://secunia.com/product/13652/ Red Hat Enterprise Linux Desktop (v. 5 client) http://secunia.com/product/13653/ Red Hat Enterprise Linux Desktop Workstation (v. 5 client) http://secunia.com/product/13651/ RedHat Enterprise Linux AS 2.1 http://secunia.com/product/48/ RedHat Enterprise Linux AS 3 http://secunia.com/product/2534/ RedHat Enterprise Linux AS 4 http://secunia.com/product/4669/ RedHat Enterprise Linux ES 2.1 http://secunia.com/product/1306/ RedHat Enterprise Linux ES 3 http://secunia.com/product/2535/ RedHat Enterprise Linux ES 4 http://secunia.com/product/4668/ RedHat Enterprise Linux WS 3 http://secunia.com/product/2536/ RedHat Enterprise Linux WS 2.1 http://secunia.com/product/1044/ RedHat Enterprise Linux WS 4 http://secunia.com/product/4670/ RedHat Linux Advanced Workstation 2.1 for Itanium http://secunia.com/product/1326/ DESCRIPTION: Red Hat has issued an update for bind. For more information: SA26152 SOLUTION: Updated packages are available from Red Hat Network. http://rhn.redhat.com ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2007-0740.html OTHER REFERENCES: SA26152: http://secunia.com/advisories/26152/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. This change increases the size of the space from which an attacker has to guess values in a backwards-compatible fashion and makes successful attacks significantly more difficult. This update also switches the random number generator to Dan Bernstein's SURF. Packages for alpha will be provided later

Trust: 4.23

sources: NVD: CVE-2008-1447 // JVNDB: JVNDB-2008-001495 // CERT/CC: VU#252735 // CERT/CC: VU#800113 // PACKETSTORM: 68039 // PACKETSTORM: 68068 // PACKETSTORM: 70207 // PACKETSTORM: 73732 // VULHUB: VHN-31572 // PACKETSTORM: 130183 // PACKETSTORM: 73060 // PACKETSTORM: 68061 // PACKETSTORM: 68199 // PACKETSTORM: 68038 // PACKETSTORM: 68546 // PACKETSTORM: 58035 // PACKETSTORM: 68691

AFFECTED PRODUCTS

vendor:iscmodel:bindscope:eqversion:8

Trust: 1.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:fujitsumodel: - scope: - version: -

Trust: 1.6

vendor:internet consortiummodel: - scope: - version: -

Trust: 1.6

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:red hatmodel: - scope: - version: -

Trust: 1.6

vendor:suse linuxmodel: - scope: - version: -

Trust: 1.6

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 1.6

vendor:ubuntumodel: - scope: - version: -

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:9.2.9

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:4

Trust: 1.0

vendor:alcatel lucentmodel: - scope: - version: -

Trust: 0.8

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:bluecatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:force10model: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:funkwerkmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:infobloxmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:nixumodel: - scope: - version: -

Trust: 0.8

vendor:nominummodel: - scope: - version: -

Trust: 0.8

vendor:nortelmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:qnxmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:wind rivermodel: - scope: - version: -

Trust: 0.8

vendor:yamahamodel: - scope: - version: -

Trust: 0.8

vendor:dnsmasqmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel:aixscope:eqversion:5.2

Trust: 0.8

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.8

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5 to v10.5.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5 to v10.5.4

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:v1.1 to v2.0.2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8624el

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8624ps

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8724sl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8724sl v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8724xl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8748sl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8748xl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8948xl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9606sx/sc

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9606t

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9812t

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9816gb

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9924sp

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9924t/4sp

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9924ts

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar260s v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar410 v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar410s v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar415s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar450s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar550s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar570s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar740

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar740s

Trust: 0.8

vendor:allied telesismodel:switchblade4000scope: - version: -

Trust: 0.8

vendor:internet initiativemodel:id gatewayscope: - version: -

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:sun microsystemsmodel:opensolarisscope:eqversion:(sparc)

Trust: 0.8

vendor:sun microsystemsmodel:opensolarisscope:eqversion:(x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (x86)

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.8

vendor:centurymodel:xr-1100scope:eqversion:ver1.6.2 previous version

Trust: 0.8

vendor:centurymodel:xr-410scope:eqversion:ver1.6.9 previous version

Trust: 0.8

vendor:centurymodel:xr-410-l2scope:eqversion:ver1.6.1 previous version

Trust: 0.8

vendor:centurymodel:xr-440scope:eqversion:ver1.7.7 previous version

Trust: 0.8

vendor:centurymodel:xr-510scope:eqversion:ver3.5.3 previous version

Trust: 0.8

vendor:centurymodel:xr-540scope:eqversion:ver3.5.2 previous version

Trust: 0.8

vendor:centurymodel:xr-640scope:eqversion:ver1.6.7 previous version

Trust: 0.8

vendor:centurymodel:xr-640-l2scope:eqversion:ver1.6.1 previous version

Trust: 0.8

vendor:centurymodel:xr-730scope:eqversion:ver3.5.0 previous version

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:1.0 (hosting)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:1.0 (workgroup)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:2.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11 (x64)

Trust: 0.8

vendor:hewlett packardmodel:hp tru64 unixscope:eqversion:v 5.1b-3

Trust: 0.8

vendor:hewlett packardmodel:hp tru64 unixscope:eqversion:v 5.1b-4

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.31

Trust: 0.8

vendor:microsoftmodel:windows 2000scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:(rt100i

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:rt102i

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:rt103i

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:rt200i

Trust: 0.8

vendor:yamahamodel:rt seriesscope:eqversion:rt80i)

Trust: 0.8

vendor:yamahamodel:rt105 seriesscope:eqversion:(rt105i

Trust: 0.8

vendor:yamahamodel:rt105 seriesscope:eqversion:rt105e

Trust: 0.8

vendor:yamahamodel:rt105 seriesscope:eqversion:rt105p)

Trust: 0.8

vendor:yamahamodel:rt107escope: - version: -

Trust: 0.8

vendor:yamahamodel:rt140 seriesscope:eqversion:(rt140i

Trust: 0.8

vendor:yamahamodel:rt140 seriesscope:eqversion:rt140e

Trust: 0.8

vendor:yamahamodel:rt140 seriesscope:eqversion:rt140p

Trust: 0.8

vendor:yamahamodel:rt140 seriesscope:eqversion:rt140f)

Trust: 0.8

vendor:yamahamodel:rt300iscope: - version: -

Trust: 0.8

vendor:yamahamodel:rt58iscope: - version: -

Trust: 0.8

vendor:yamahamodel:rta seriesscope:eqversion:(rta55i

Trust: 0.8

vendor:yamahamodel:rta seriesscope:eqversion:rta54i

Trust: 0.8

vendor:yamahamodel:rta seriesscope:eqversion:rta52i

Trust: 0.8

vendor:yamahamodel:rta seriesscope:eqversion:rta50i)

Trust: 0.8

vendor:yamahamodel:rtv seriesscope:eqversion:(rtv700

Trust: 0.8

vendor:yamahamodel:rtv seriesscope:eqversion:rtv01)

Trust: 0.8

vendor:yamahamodel:rtw seriesscope:eqversion:(rt60w

Trust: 0.8

vendor:yamahamodel:rtw seriesscope:eqversion:rtw65i

Trust: 0.8

vendor:yamahamodel:rtw seriesscope:eqversion:rtw65b)

Trust: 0.8

vendor:yamahamodel:rtx1000scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx1100scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx1500scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx2000scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx3000scope: - version: -

Trust: 0.8

vendor:yamahamodel:srt100scope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:linux advanced workstationscope:eqversion:2.1

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-e seriesscope:eqversion:fitelnet-e20/e30

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f40

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f80/f100/f120/f140/f1000/f2000

Trust: 0.8

vendor:necmodel:ip38x seriesscope: - version: -

Trust: 0.8

vendor:necmodel:ix1000 seriesscope: - version: -

Trust: 0.8

vendor:necmodel:ix2000 seriesscope: - version: -

Trust: 0.8

vendor:necmodel:ix3000 seriesscope: - version: -

Trust: 0.8

vendor:fujitsumodel:ipcom seriesscope: - version: -

Trust: 0.8

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // JVNDB: JVNDB-2008-001495 // NVD: CVE-2008-1447

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1447
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#800113
value: 27.54

Trust: 0.8

CARNEGIE MELLON: VU#252735
value: 3.83

Trust: 0.8

NVD: CVE-2008-1447
value: MEDIUM

Trust: 0.8

VULHUB: VHN-31572
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2008-1447
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-31572
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // JVNDB: JVNDB-2008-001495 // NVD: CVE-2008-1447

PROBLEMTYPE DATA

problemtype:CWE-331

Trust: 1.1

problemtype:CWE-20

Trust: 0.8

problemtype:CWE-310

Trust: 0.1

sources: VULHUB: VHN-31572 // JVNDB: JVNDB-2008-001495 // NVD: CVE-2008-1447

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 68068

TYPE

spoof

Trust: 0.4

sources: PACKETSTORM: 68068 // PACKETSTORM: 70207 // PACKETSTORM: 68038 // PACKETSTORM: 68546

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001495

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-31572

PATCH

title:APPLE-SA-2008-09-12url:http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html

Trust: 0.8

title:APPLE-SA-2008-09-15url:http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html

Trust: 0.8

title:APPLE-SA-2008-07-31url:http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html

Trust: 0.8

title:APPLE-SA-2008-09-09url:http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html

Trust: 0.8

title:Security Update 2008-006url:http://support.apple.com/kb/HT3137

Trust: 0.8

title:Security Update 2008-005url:http://support.apple.com/kb/HT2647

Trust: 0.8

title:iPod touch v2.1url:http://support.apple.com/kb/HT3026

Trust: 0.8

title:bind-9.3.3-10.4AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=140

Trust: 0.8

title:dnsmasq-2.45-1AXS3.1.1url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=345

Trust: 0.8

title:cisco-sa-20080708-dnsurl:http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml

Trust: 0.8

title:20080709url:http://www.furukawa.co.jp/fitelnet/topic/vulnera_20080709.html

Trust: 0.8

title:DNS cache poisoningurl:http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc

Trust: 0.8

title:JVNVU800113url:http://www.centurysys.co.jp/support/xr_common/JVNVU800113.html

Trust: 0.8

title:HPSBUX02351url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01506861

Trust: 0.8

title:HPSBOV02357 SSRT080058url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01662368

Trust: 0.8

title:HPSBMP02404 SSRT090014url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01660723

Trust: 0.8

title:HPSBUX02358url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01527346

Trust: 0.8

title:IZ26672url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26672

Trust: 0.8

title:IZ26667url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26667

Trust: 0.8

title:IZ26668url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26668

Trust: 0.8

title:IZ26671url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26671

Trust: 0.8

title:IZ26670url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26670

Trust: 0.8

title:IZ26669url:http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26669

Trust: 0.8

title:4525url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4525

Trust: 0.8

title:4338url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4338

Trust: 0.8

title:Top Pageurl:http://www.iij.ad.jp

Trust: 0.8

title:CERT VU#800113 DNS Cache Poisoning Issueurl:http://www.isc.org/index.pl?/sw/bind/bind-security.php

Trust: 0.8

title:956187url:http://www.microsoft.com/technet/security/advisory/956187.mspx

Trust: 0.8

title:MS08-037url:http://www.microsoft.com/technet/security/bulletin/MS08-037.mspx

Trust: 0.8

title:1316url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1316

Trust: 0.8

title:1649url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1649

Trust: 0.8

title:1296url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1296

Trust: 0.8

title:1297url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1297

Trust: 0.8

title:NV08-008url:http://www.nec.co.jp/security-info/secinfo/nv08-008.html

Trust: 0.8

title:RHSA-2008:0789url:https://rhn.redhat.com/errata/RHSA-2008-0789.html

Trust: 0.8

title:RHSA-2008:0533url:http://rhn.redhat.com/errata/RHSA-2008-0533.html

Trust: 0.8

title:VU800113url:http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html

Trust: 0.8

title:239392url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-239392-1

Trust: 0.8

title:240048url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-240048-1

Trust: 0.8

title:dns_12url:http://fenics.fujitsu.com/products/support/2008/dns_12.html

Trust: 0.8

title:DNSに関するキャッシュポイズニング脆弱性についてurl:http://www.allied-telesis.co.jp/support/list/faq/vuls/20080813.html

Trust: 0.8

title:956187url:http://www.microsoft.com/japan/technet/security/advisory/956187.mspx

Trust: 0.8

title:MS08-037url:http://www.microsoft.com/japan/technet/security/bulletin/ms08-037.mspx

Trust: 0.8

title:RHSA-2008:0533url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0533J.html

Trust: 0.8

title:RHSA-2008:0789url:https://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0789J.html

Trust: 0.8

title:MS08-037eurl:http://www.microsoft.com/japan/security/bulletins/MS08-037e.mspx

Trust: 0.8

title:TLSA-2008-26url:http://www.turbolinux.co.jp/security/2008/TLSA-2008-26j.txt

Trust: 0.8

title:TA08-190Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-190a.html

Trust: 0.8

title:TA08-190Burl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-190b.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-001495

EXTERNAL IDS

db:NVDid:CVE-2008-1447

Trust: 3.0

db:CERT/CCid:VU#800113

Trust: 2.8

db:USCERTid:TA08-190B

Trust: 2.0

db:SECUNIAid:30980

Trust: 1.9

db:SECUNIAid:31014

Trust: 1.9

db:SECUNIAid:30925

Trust: 1.9

db:USCERTid:TA08-260A

Trust: 1.9

db:USCERTid:TA08-190A

Trust: 1.9

db:BIDid:30131

Trust: 1.9

db:VUPENid:ADV-2008-2025

Trust: 1.1

db:VUPENid:ADV-2009-0297

Trust: 1.1

db:VUPENid:ADV-2008-2334

Trust: 1.1

db:VUPENid:ADV-2008-2383

Trust: 1.1

db:VUPENid:ADV-2008-2113

Trust: 1.1

db:VUPENid:ADV-2008-2558

Trust: 1.1

db:VUPENid:ADV-2008-2019

Trust: 1.1

db:VUPENid:ADV-2008-2377

Trust: 1.1

db:VUPENid:ADV-2008-2584

Trust: 1.1

db:VUPENid:ADV-2008-2342

Trust: 1.1

db:VUPENid:ADV-2010-0622

Trust: 1.1

db:VUPENid:ADV-2008-2166

Trust: 1.1

db:VUPENid:ADV-2008-2051

Trust: 1.1

db:VUPENid:ADV-2008-2092

Trust: 1.1

db:VUPENid:ADV-2008-2029

Trust: 1.1

db:VUPENid:ADV-2008-2384

Trust: 1.1

db:VUPENid:ADV-2008-2268

Trust: 1.1

db:VUPENid:ADV-2008-2052

Trust: 1.1

db:VUPENid:ADV-2008-2549

Trust: 1.1

db:VUPENid:ADV-2008-2197

Trust: 1.1

db:VUPENid:ADV-2009-0311

Trust: 1.1

db:VUPENid:ADV-2008-2055

Trust: 1.1

db:VUPENid:ADV-2008-2467

Trust: 1.1

db:VUPENid:ADV-2008-2123

Trust: 1.1

db:VUPENid:ADV-2008-2482

Trust: 1.1

db:VUPENid:ADV-2008-2525

Trust: 1.1

db:VUPENid:ADV-2008-2023

Trust: 1.1

db:VUPENid:ADV-2008-2582

Trust: 1.1

db:VUPENid:ADV-2008-2114

Trust: 1.1

db:VUPENid:ADV-2008-2196

Trust: 1.1

db:VUPENid:ADV-2008-2139

Trust: 1.1

db:VUPENid:ADV-2008-2466

Trust: 1.1

db:VUPENid:ADV-2008-2050

Trust: 1.1

db:VUPENid:ADV-2008-2195

Trust: 1.1

db:VUPENid:ADV-2008-2291

Trust: 1.1

db:VUPENid:ADV-2008-2030

Trust: 1.1

db:SECTRACKid:1020548

Trust: 1.1

db:SECTRACKid:1020578

Trust: 1.1

db:SECTRACKid:1020448

Trust: 1.1

db:SECTRACKid:1020558

Trust: 1.1

db:SECTRACKid:1020702

Trust: 1.1

db:SECTRACKid:1020440

Trust: 1.1

db:SECTRACKid:1020575

Trust: 1.1

db:SECTRACKid:1020437

Trust: 1.1

db:SECTRACKid:1020802

Trust: 1.1

db:SECTRACKid:1020449

Trust: 1.1

db:SECTRACKid:1020579

Trust: 1.1

db:SECTRACKid:1020561

Trust: 1.1

db:SECTRACKid:1020804

Trust: 1.1

db:SECTRACKid:1020577

Trust: 1.1

db:SECTRACKid:1020560

Trust: 1.1

db:SECTRACKid:1020651

Trust: 1.1

db:SECTRACKid:1020653

Trust: 1.1

db:SECTRACKid:1020438

Trust: 1.1

db:SECTRACKid:1020576

Trust: 1.1

db:SECUNIAid:31209

Trust: 1.1

db:SECUNIAid:31197

Trust: 1.1

db:SECUNIAid:31422

Trust: 1.1

db:SECUNIAid:30977

Trust: 1.1

db:SECUNIAid:31151

Trust: 1.1

db:SECUNIAid:31354

Trust: 1.1

db:SECUNIAid:31093

Trust: 1.1

db:SECUNIAid:31212

Trust: 1.1

db:SECUNIAid:31207

Trust: 1.1

db:SECUNIAid:31221

Trust: 1.1

db:SECUNIAid:31254

Trust: 1.1

db:SECUNIAid:31451

Trust: 1.1

db:SECUNIAid:31169

Trust: 1.1

db:SECUNIAid:30988

Trust: 1.1

db:SECUNIAid:30973

Trust: 1.1

db:SECUNIAid:31687

Trust: 1.1

db:SECUNIAid:31199

Trust: 1.1

db:SECUNIAid:31137

Trust: 1.1

db:SECUNIAid:30998

Trust: 1.1

db:SECUNIAid:31065

Trust: 1.1

db:SECUNIAid:31882

Trust: 1.1

db:SECUNIAid:31019

Trust: 1.1

db:SECUNIAid:31153

Trust: 1.1

db:SECUNIAid:31482

Trust: 1.1

db:SECUNIAid:31495

Trust: 1.1

db:SECUNIAid:33178

Trust: 1.1

db:SECUNIAid:33714

Trust: 1.1

db:SECUNIAid:31213

Trust: 1.1

db:SECUNIAid:31326

Trust: 1.1

db:SECUNIAid:31052

Trust: 1.1

db:SECUNIAid:31011

Trust: 1.1

db:SECUNIAid:31588

Trust: 1.1

db:SECUNIAid:31033

Trust: 1.1

db:SECUNIAid:31031

Trust: 1.1

db:SECUNIAid:31430

Trust: 1.1

db:SECUNIAid:30979

Trust: 1.1

db:SECUNIAid:31022

Trust: 1.1

db:SECUNIAid:31094

Trust: 1.1

db:SECUNIAid:31030

Trust: 1.1

db:SECUNIAid:31204

Trust: 1.1

db:SECUNIAid:31072

Trust: 1.1

db:SECUNIAid:31152

Trust: 1.1

db:SECUNIAid:31237

Trust: 1.1

db:SECUNIAid:31012

Trust: 1.1

db:SECUNIAid:33786

Trust: 1.1

db:SECUNIAid:31143

Trust: 1.1

db:SECUNIAid:31236

Trust: 1.1

db:SECUNIAid:31900

Trust: 1.1

db:SECUNIAid:30989

Trust: 1.1

db:SECUNIAid:31823

Trust: 1.1

db:EXPLOIT-DBid:6130

Trust: 1.1

db:EXPLOIT-DBid:6123

Trust: 1.1

db:EXPLOIT-DBid:6122

Trust: 1.1

db:SECUNIAid:26195

Trust: 0.9

db:CERT/CCid:VU#252735

Trust: 0.9

db:EXPLOIT-DBid:4266

Trust: 0.8

db:USCERTid:SA08-190A

Trust: 0.8

db:JVNDBid:JVNDB-2008-001495

Trust: 0.8

db:PACKETSTORMid:68038

Trust: 0.2

db:PACKETSTORMid:73060

Trust: 0.2

db:PACKETSTORMid:68061

Trust: 0.2

db:PACKETSTORMid:68199

Trust: 0.2

db:PACKETSTORMid:68068

Trust: 0.2

db:PACKETSTORMid:73732

Trust: 0.2

db:PACKETSTORMid:70207

Trust: 0.2

db:PACKETSTORMid:68039

Trust: 0.2

db:PACKETSTORMid:68691

Trust: 0.2

db:PACKETSTORMid:68546

Trust: 0.2

db:PACKETSTORMid:68878

Trust: 0.1

db:PACKETSTORMid:68755

Trust: 0.1

db:PACKETSTORMid:68412

Trust: 0.1

db:PACKETSTORMid:68118

Trust: 0.1

db:PACKETSTORMid:68502

Trust: 0.1

db:PACKETSTORMid:74443

Trust: 0.1

db:PACKETSTORMid:68288

Trust: 0.1

db:PACKETSTORMid:96747

Trust: 0.1

db:PACKETSTORMid:94774

Trust: 0.1

db:PACKETSTORMid:68183

Trust: 0.1

db:PACKETSTORMid:68471

Trust: 0.1

db:PACKETSTORMid:68036

Trust: 0.1

db:PACKETSTORMid:68500

Trust: 0.1

db:PACKETSTORMid:68360

Trust: 0.1

db:PACKETSTORMid:68037

Trust: 0.1

db:PACKETSTORMid:68473

Trust: 0.1

db:PACKETSTORMid:68129

Trust: 0.1

db:PACKETSTORMid:68554

Trust: 0.1

db:PACKETSTORMid:68063

Trust: 0.1

db:PACKETSTORMid:68543

Trust: 0.1

db:SEEBUGid:SSVID-65607

Trust: 0.1

db:VULHUBid:VHN-31572

Trust: 0.1

db:PACKETSTORMid:130183

Trust: 0.1

db:CERT/CCid:VU#484649

Trust: 0.1

db:CERT/CCid:VU#457875

Trust: 0.1

db:CERT/CCid:VU#927905

Trust: 0.1

db:PACKETSTORMid:58035

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // JVNDB: JVNDB-2008-001495 // PACKETSTORM: 68039 // PACKETSTORM: 68068 // PACKETSTORM: 70207 // PACKETSTORM: 73732 // PACKETSTORM: 68691 // PACKETSTORM: 130183 // PACKETSTORM: 73060 // PACKETSTORM: 68061 // PACKETSTORM: 68199 // PACKETSTORM: 68038 // PACKETSTORM: 68546 // PACKETSTORM: 58035 // NVD: CVE-2008-1447

REFERENCES

url:http://www.securityfocus.com/bid/30131

Trust: 1.9

url:http://www.us-cert.gov/cas/techalerts/ta08-190a.html

Trust: 1.9

url:http://www.us-cert.gov/cas/techalerts/ta08-190b.html

Trust: 1.9

url:http://www.us-cert.gov/cas/techalerts/ta08-260a.html

Trust: 1.9

url:http://www.kb.cert.org/vuls/id/800113

Trust: 1.9

url:http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience

Trust: 1.6

url:http://tools.ietf.org/html/rfc3833

Trust: 1.6

url:http://tools.ietf.org/html/rfc2827

Trust: 1.6

url:http://tools.ietf.org/html/rfc3704

Trust: 1.6

url:http://tools.ietf.org/html/draft-ietf-tsvwg-port-randomization

Trust: 1.6

url:http://security.gentoo.org/glsa/glsa-200812-17.xml

Trust: 1.2

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26667

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26668

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26669

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26670

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26671

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26672

Trust: 1.1

url:http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00004.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00005.html

Trust: 1.1

url:http://www.securityfocus.com/archive/1/495289/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/495869/100/0/threaded

Trust: 1.1

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00809c2168.shtml

Trust: 1.1

url:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401

Trust: 1.1

url:http://support.apple.com/kb/ht3026

Trust: 1.1

url:http://support.apple.com/kb/ht3129

Trust: 1.1

url:http://support.citrix.com/article/ctx117991

Trust: 1.1

url:http://support.citrix.com/article/ctx118183

Trust: 1.1

url:http://up2date.astaro.com/2008/08/up2date_7202_released.html

Trust: 1.1

url:http://wiki.rpath.com/wiki/advisories:rpsa-2008-0231

Trust: 1.1

url:http://wiki.rpath.com/wiki/advisories:rpsa-2010-0018

Trust: 1.1

url:http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning

Trust: 1.1

url:http://www.isc.org/index.pl?/sw/bind/bind-security.php

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/mimg-7dwr4j

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/mimg-7ecl8q

Trust: 1.1

url:http://www.novell.com/support/viewcontent.do?externalid=7000912

Trust: 1.1

url:http://www.phys.uu.nl/~rombouts/pdnsd.html

Trust: 1.1

url:http://www.phys.uu.nl/~rombouts/pdnsd/changelog

Trust: 1.1

url:http://www.rtpro.yamaha.co.jp/rt/faq/security/vu800113.html

Trust: 1.1

url:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2008-0014.html

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1603

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1604

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1605

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1619

Trust: 1.1

url:http://www.debian.org/security/2008/dsa-1623

Trust: 1.1

url:https://www.exploit-db.com/exploits/6122

Trust: 1.1

url:https://www.exploit-db.com/exploits/6123

Trust: 1.1

url:https://www.exploit-db.com/exploits/6130

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00402.html

Trust: 1.1

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00458.html

Trust: 1.1

url:http://security.freebsd.org/advisories/freebsd-sa-08:06.bind.asc

Trust: 1.1

url:http://lists.grok.org.uk/pipermail/full-disclosure/2008-august/064118.html

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-200807-08.xml

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-201209-25.xml

Trust: 1.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01662368

Trust: 1.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01523520

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2008:139

Trust: 1.1

url:http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html

Trust: 1.1

url:http://www.caughq.org/exploits/cau-ex-2008-0002.txt

Trust: 1.1

url:http://www.caughq.org/exploits/cau-ex-2008-0003.txt

Trust: 1.1

url:http://www.doxpara.com/?p=1176

Trust: 1.1

url:http://www.doxpara.com/dmk_bo2k8.ppt

Trust: 1.1

url:http://www.nominum.com/asset_upload_file741_2661.pdf

Trust: 1.1

url:http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html

Trust: 1.1

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037

Trust: 1.1

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2008-009.txt.asc

Trust: 1.1

url:http://www.openbsd.org/errata42.html#013_bind

Trust: 1.1

url:http://www.openbsd.org/errata43.html#004_bind

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12117

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5725

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5761

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5917

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9627

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2008-0533.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2008-0789.html

Trust: 1.1

url:http://www.securitytracker.com/id?1020437

Trust: 1.1

url:http://www.securitytracker.com/id?1020438

Trust: 1.1

url:http://www.securitytracker.com/id?1020440

Trust: 1.1

url:http://www.securitytracker.com/id?1020448

Trust: 1.1

url:http://www.securitytracker.com/id?1020449

Trust: 1.1

url:http://www.securitytracker.com/id?1020548

Trust: 1.1

url:http://www.securitytracker.com/id?1020558

Trust: 1.1

url:http://www.securitytracker.com/id?1020560

Trust: 1.1

url:http://www.securitytracker.com/id?1020561

Trust: 1.1

url:http://www.securitytracker.com/id?1020575

Trust: 1.1

url:http://www.securitytracker.com/id?1020576

Trust: 1.1

url:http://www.securitytracker.com/id?1020577

Trust: 1.1

url:http://www.securitytracker.com/id?1020578

Trust: 1.1

url:http://www.securitytracker.com/id?1020579

Trust: 1.1

url:http://www.securitytracker.com/id?1020651

Trust: 1.1

url:http://www.securitytracker.com/id?1020653

Trust: 1.1

url:http://www.securitytracker.com/id?1020702

Trust: 1.1

url:http://www.securitytracker.com/id?1020802

Trust: 1.1

url:http://www.securitytracker.com/id?1020804

Trust: 1.1

url:http://secunia.com/advisories/30925

Trust: 1.1

url:http://secunia.com/advisories/30973

Trust: 1.1

url:http://secunia.com/advisories/30977

Trust: 1.1

url:http://secunia.com/advisories/30979

Trust: 1.1

url:http://secunia.com/advisories/30980

Trust: 1.1

url:http://secunia.com/advisories/30988

Trust: 1.1

url:http://secunia.com/advisories/30989

Trust: 1.1

url:http://secunia.com/advisories/30998

Trust: 1.1

url:http://secunia.com/advisories/31011

Trust: 1.1

url:http://secunia.com/advisories/31012

Trust: 1.1

url:http://secunia.com/advisories/31014

Trust: 1.1

url:http://secunia.com/advisories/31019

Trust: 1.1

url:http://secunia.com/advisories/31022

Trust: 1.1

url:http://secunia.com/advisories/31030

Trust: 1.1

url:http://secunia.com/advisories/31031

Trust: 1.1

url:http://secunia.com/advisories/31033

Trust: 1.1

url:http://secunia.com/advisories/31052

Trust: 1.1

url:http://secunia.com/advisories/31065

Trust: 1.1

url:http://secunia.com/advisories/31072

Trust: 1.1

url:http://secunia.com/advisories/31093

Trust: 1.1

url:http://secunia.com/advisories/31094

Trust: 1.1

url:http://secunia.com/advisories/31137

Trust: 1.1

url:http://secunia.com/advisories/31143

Trust: 1.1

url:http://secunia.com/advisories/31151

Trust: 1.1

url:http://secunia.com/advisories/31152

Trust: 1.1

url:http://secunia.com/advisories/31153

Trust: 1.1

url:http://secunia.com/advisories/31169

Trust: 1.1

url:http://secunia.com/advisories/31197

Trust: 1.1

url:http://secunia.com/advisories/31199

Trust: 1.1

url:http://secunia.com/advisories/31204

Trust: 1.1

url:http://secunia.com/advisories/31207

Trust: 1.1

url:http://secunia.com/advisories/31209

Trust: 1.1

url:http://secunia.com/advisories/31212

Trust: 1.1

url:http://secunia.com/advisories/31213

Trust: 1.1

url:http://secunia.com/advisories/31221

Trust: 1.1

url:http://secunia.com/advisories/31236

Trust: 1.1

url:http://secunia.com/advisories/31237

Trust: 1.1

url:http://secunia.com/advisories/31254

Trust: 1.1

url:http://secunia.com/advisories/31326

Trust: 1.1

url:http://secunia.com/advisories/31354

Trust: 1.1

url:http://secunia.com/advisories/31422

Trust: 1.1

url:http://secunia.com/advisories/31430

Trust: 1.1

url:http://secunia.com/advisories/31451

Trust: 1.1

url:http://secunia.com/advisories/31482

Trust: 1.1

url:http://secunia.com/advisories/31495

Trust: 1.1

url:http://secunia.com/advisories/31588

Trust: 1.1

url:http://secunia.com/advisories/31687

Trust: 1.1

url:http://secunia.com/advisories/31823

Trust: 1.1

url:http://secunia.com/advisories/31882

Trust: 1.1

url:http://secunia.com/advisories/31900

Trust: 1.1

url:http://secunia.com/advisories/33178

Trust: 1.1

url:http://secunia.com/advisories/33714

Trust: 1.1

url:http://secunia.com/advisories/33786

Trust: 1.1

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1

Trust: 1.1

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-622-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-627-1

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2019/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2023/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2025/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2029/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2030/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2050/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2051/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2052/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2055/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2092/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2113/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2114/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2123/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2139/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2166/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2195/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2196/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2197/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2268

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2291

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2334

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2342

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2377

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2383

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2384

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2466

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2467

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2482

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2525

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2549

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2558

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2582

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2584

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/0297

Trust: 1.1

url:http://www.vupen.com/english/advisories/2009/0311

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/0622

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43637

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43334

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1447

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1447

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=121630706004256&w=2

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=121866517322103&w=2

Trust: 1.0

url:http://www.ipcop.org/index.php?name=news&file=article&sid=40

Trust: 1.0

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=762152

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=123324863916385&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=141879471518471&w=2

Trust: 1.0

url:http://secunia.com/advisories/26195/

Trust: 0.9

url:http://csrc.nist.gov/publications/nistpubs/800-81/sp800-81.pdf

Trust: 0.8

url:http://tools.ietf.org/html/rfc3013

Trust: 0.8

url:http://tools.ietf.org/html/rfc4033

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_random.html

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_transmit.html

Trust: 0.8

url:http://cr.yp.to/djbdns/forgery.html

Trust: 0.8

url:http://www.trusteer.com/microsoftdns

Trust: 0.8

url:http://www.trusteer.com/bind9dns

Trust: 0.8

url:http://www.trusteer.com/bind8dns

Trust: 0.8

url:http://www.sans.org/reading_room/whitepapers/dns/1567.php

Trust: 0.8

url:http://blogs.iss.net/archive/morednsnat.html

Trust: 0.8

url:https://jvn.jp/cert/jvnvu800113/

Trust: 0.8

url:http://www.cert.at/static/cert.at-0802-dns-patchanalysis.pdf

Trust: 0.8

url:http://www.isc.org/sw/bind/bind-security.php

Trust: 0.8

url:http://www.trusteer.com/docs/bind9dns.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23252735/index.html

Trust: 0.8

url:http://www.milw0rm.com/exploits/4266

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=307041

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2019

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2055

Trust: 0.8

url:http://www.ipa.go.jp/security/vuln/documents/2008/200812_dns.html

Trust: 0.8

url:http://www.ipa.go.jp/security/vuln/documents/2009/200912_dns.html

Trust: 0.8

url:http://www.ipa.go.jp/security/vuln/documents/2008/200809_dns.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2008/at080013.txt

Trust: 0.8

url:https://www.jpcert.or.jp/at/2008/at080014.txt

Trust: 0.8

url:https://www.jpcert.or.jp/at/2014/at140016.html

Trust: 0.8

url:http://jprs.jp/tech/security/2014-04-15-portrandomization.html

Trust: 0.8

url:http://jprs.jp/tech/security/2014-05-30-poisoning-countermeasure-auth-1.pdf

Trust: 0.8

url:http://jvn.jp/cert/jvnvu800113/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-190a/

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-190b/

Trust: 0.8

url:http://jvn.jp/tr/trta08-190a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-190b/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1447

Trust: 0.8

url:http://secunia.com/advisories/30925/

Trust: 0.8

url:http://secunia.com/advisories/31014/

Trust: 0.8

url:http://secunia.com/advisories/30980/

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-190a.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2009/20090212_155349.html

Trust: 0.8

url:http://packages.debian.org/<pkg>

Trust: 0.4

url:http://security.debian.org/

Trust: 0.4

url:http://www.debian.org/security/faq

Trust: 0.4

url:http://www.debian.org/security/

Trust: 0.4

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz

Trust: 0.2

url:http://bugs.gentoo.org.

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:http://security.gentoo.org/

Trust: 0.2

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&amp;id=762152

Trust: 0.1

url:http://www.ipcop.org/index.php?name=news&amp;file=article&amp;sid=40

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=123324863916385&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=141879471518471&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121866517322103&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121630706004256&amp;w=2

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.539239

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.452680

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml.

Trust: 0.1

url:http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html.

Trust: 0.1

url:http://www.cisco.com/go/psirt

Trust: 0.1

url:http://www.cisco.com/web/about/security/intelligence/dns-bcp.html.

Trust: 0.1

url:http://www.cisco.com/en/us/products/prod_warranties_item09186a008088e31f.html,

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/software/tablebuild/tablebuild.pl/nr-eval

Trust: 0.1

url:http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/acns55

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml

Trust: 0.1

url:http://www.cisco.com.

Trust: 0.1

url:http://www.cisco.com/go/psirt.

Trust: 0.1

url:https://www.example.com

Trust: 0.1

url:http://www.cisco.com/warp/public/687/directory/dirtac.shtml

Trust: 0.1

url:http://www.cisco.com/public/sw-center/sw-usingswc.shtml.

Trust: 0.1

url:http://intellishield.cisco.com/security/alertmanager/cvss

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.diff.gz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4194

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200901-03.xml

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4194

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4.dsc

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2926

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4313

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0025

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-4096

Trust: 0.1

url:https://h20566.www2.hp.com/portal/site/hpsc/patch/home/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4244

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2376

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2662

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2376

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3655

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3905

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2663

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2664

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2662

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3657

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3656

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2663

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2664

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3655

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3905

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2725

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2725

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3656

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3657

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/800113>

Trust: 0.1

url:http://tools.ietf.org/html/rfc3704>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/252735>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/927905>

Trust: 0.1

url:http://tools.ietf.org/html/rfc2827>

Trust: 0.1

url:http://tools.ietf.org/html/rfc3013>

Trust: 0.1

url:http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/484649>

Trust: 0.1

url:http://www.isc.org/sw/bind/bind-security.php>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-190b.html>

Trust: 0.1

url:http://tools.ietf.org/html/rfc3833>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/457875>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0107

Trust: 0.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/documentindex.jsp?contenttype=supportmanual&lang=en&cc=us&docindexid=179111&taskid=101&prodtypeid=12169&prodseriesid=315667

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0086

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1454

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2247

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1435

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0106

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0085

Trust: 0.1

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/summary.mspx

Trust: 0.1

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.1

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2248

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=889482fc-5f56-4a38-b838-de776fd4138c&hash=syssxdf&displaylang=en

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.diff.gz

Trust: 0.1

url:http://secunia.com/product/2536/

Trust: 0.1

url:http://rhn.redhat.com/errata/rhsa-2007-0740.html

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/2535/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/13653/

Trust: 0.1

url:http://secunia.com/product/48/

Trust: 0.1

url:http://rhn.redhat.com

Trust: 0.1

url:http://secunia.com/product/13651/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/4669/

Trust: 0.1

url:http://secunia.com/product/4668/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13652/

Trust: 0.1

url:http://secunia.com/product/1326/

Trust: 0.1

url:http://secunia.com/advisories/26152/

Trust: 0.1

url:http://secunia.com/product/1306/

Trust: 0.1

url:http://secunia.com/product/4670/

Trust: 0.1

url:http://secunia.com/product/2534/

Trust: 0.1

url:http://secunia.com/product/1044/

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // JVNDB: JVNDB-2008-001495 // PACKETSTORM: 68039 // PACKETSTORM: 68068 // PACKETSTORM: 70207 // PACKETSTORM: 73732 // PACKETSTORM: 68691 // PACKETSTORM: 130183 // PACKETSTORM: 73060 // PACKETSTORM: 68061 // PACKETSTORM: 68199 // PACKETSTORM: 68038 // PACKETSTORM: 68546 // PACKETSTORM: 58035 // NVD: CVE-2008-1447

CREDITS

Debian

Trust: 0.4

sources: PACKETSTORM: 70207 // PACKETSTORM: 68691 // PACKETSTORM: 68038 // PACKETSTORM: 68546

SOURCES

db:CERT/CCid:VU#800113
db:CERT/CCid:VU#252735
db:VULHUBid:VHN-31572
db:JVNDBid:JVNDB-2008-001495
db:PACKETSTORMid:68039
db:PACKETSTORMid:68068
db:PACKETSTORMid:70207
db:PACKETSTORMid:73732
db:PACKETSTORMid:68691
db:PACKETSTORMid:130183
db:PACKETSTORMid:73060
db:PACKETSTORMid:68061
db:PACKETSTORMid:68199
db:PACKETSTORMid:68038
db:PACKETSTORMid:68546
db:PACKETSTORMid:58035
db:NVDid:CVE-2008-1447

LAST UPDATE DATE

2025-01-28T20:22:56.055000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#800113date:2014-04-14T00:00:00
db:CERT/CCid:VU#252735date:2008-08-06T00:00:00
db:VULHUBid:VHN-31572date:2020-03-24T00:00:00
db:JVNDBid:JVNDB-2008-001495date:2014-06-02T00:00:00
db:NVDid:CVE-2008-1447date:2024-11-21T00:44:32.723

SOURCES RELEASE DATE

db:CERT/CCid:VU#800113date:2008-07-08T00:00:00
db:CERT/CCid:VU#252735date:2007-07-27T00:00:00
db:VULHUBid:VHN-31572date:2008-07-08T00:00:00
db:JVNDBid:JVNDB-2008-001495date:2008-07-23T00:00:00
db:PACKETSTORMid:68039date:2008-07-10T06:26:35
db:PACKETSTORMid:68068date:2008-07-10T07:29:30
db:PACKETSTORMid:70207date:2008-09-22T21:37:12
db:PACKETSTORMid:73732date:2009-01-12T19:16:04
db:PACKETSTORMid:68691date:2008-07-31T22:22:45
db:PACKETSTORMid:130183date:2015-01-30T22:37:09
db:PACKETSTORMid:73060date:2008-12-16T21:29:31
db:PACKETSTORMid:68061date:2008-07-10T07:07:50
db:PACKETSTORMid:68199date:2008-07-15T16:45:48
db:PACKETSTORMid:68038date:2008-07-10T06:24:58
db:PACKETSTORMid:68546date:2008-07-28T15:27:39
db:PACKETSTORMid:58035date:2007-07-26T04:26:32
db:NVDid:CVE-2008-1447date:2008-07-08T23:41:00