ID

VAR-200707-0675


CVE

CVE-2008-1447


TITLE

Multiple DNS implementations vulnerable to cache poisoning

Trust: 0.8

sources: CERT/CC: VU#800113

DESCRIPTION

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug.". ISC (Internet Systems Consortiuim) BIND generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches. Deficiencies in the DNS protocol and common DNS implementations facilitate DNS cache poisoning attacks. RESOLUTION The resolution is to discontinue the use of BIND/iX and migrate DNS services to another platform. =========================================================== Ubuntu Security Notice USN-627-1 July 22, 2008 dnsmasq vulnerability CVE-2008-1447 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.04 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.04 LTS: dnsmasq-base 2.41-2ubuntu2.1 After a standard system upgrade you need to restart Dnsmasq to effect the necessary changes. Details follow: Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Dnsmasq. Workaround ========== There is no known workaround at this time. Resolution ========== All BIND users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.2_p1" Note: In order to utilize the query port randomization to mitigate the weakness, you need to make sure that your network setup allows the DNS server to use random source ports for query and that you have not set a fixed query port via the "query-source port" directive in the BIND configuration. The fix introduced a regression in the library breaking the resolution of UTF-8 encoded record names. An updated release is available which corrects this problem. For reference, the original advisory text follows. Multiple weaknesses have been identified in PyDNS, a DNS client implementation for the Python language. Scott Kitterman noted that python-dns is vulnerable to this predictability, as it randomizes neither its transaction ID nor its source port. Taken together, this lack of entropy leaves applications using python-dns to perform DNS queries highly susceptible to response forgery. The Common Vulnerabilities and Exposures project identifies this class of weakness as CVE-2008-1447. For the stable distribution (etch), these problems have been fixed in version 2.3.0-5.2+etch2. We recommend that you upgrade your python-dns package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - ------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.diff.gz Size/MD5 checksum: 3807 4c9dceefe0dfc4ee933f3c9298764153 http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz Size/MD5 checksum: 21084 82d377c6a59181072b30b0da4e9835b8 http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.dsc Size/MD5 checksum: 695 16b84a9d56bdd4baf5cdf1bf7e413521 Architecture independent packages: http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2_all.deb Size/MD5 checksum: 22972 59775332c3bb11b1408c83cf25b8e253 These files will probably be moved into the stable distribution on its next update. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200901-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: pdnsd: Denial of Service and cache poisoning Date: January 11, 2009 Bugs: #231285 ID: 200901-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Two errors in pdnsd allow for Denial of Service and cache poisoning. Background ========== pdnsd is a proxy DNS server with permanent caching that is designed to cope with unreachable DNS servers. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/pdnsd < 1.2.7 >= 1.2.7 Description =========== Two issues have been reported in pdnsd: * The p_exec_query() function in src/dns_query.c does not properly handle many entries in the answer section of a DNS reply, related to a "dangling pointer bug" (CVE-2008-4194). Impact ====== An attacker could exploit the second weakness to poison the cache of pdnsd and thus spoof DNS traffic, which could e.g. The first issue can be exploited by enticing pdnsd to send a query to a malicious DNS server, or using the port randomization weakness, and might lead to a Denial of Service. Workaround ========== Port randomization can be enabled by setting the "query_port_start" option to 1024 which would resolve the CVE-2008-1447 issue. Resolution ========== All pdnsd users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/pdnsd-1.2.7" References ========== [ 1 ] CVE-2008-1447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 [ 2 ] CVE-2008-4194 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4194 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200901-03.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . This change increases the size of the space from which an attacker has to guess values in a backwards-compatible fashion and makes successful attacks significantly more difficult. This update also switches the random number generator to Dan Bernstein's SURF. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. When the destination address is a DNS port, it will allow remote attackers to bypass CVE-2008 -1447 security protection. And spoof the address returned by the DNS response. All customers should test the updates / patch in their environment. HP is investigating changes to reduce the performance issues. This bulletin will be revised when new updates / patch become available. HP TCP/IP Services for OpenVMS 5.7 ECO5 package is available from the following location: The HP TCP/IP Services for OpenVMS 5.7 ECO5 kits for both Integrity and Alpha platforms have been uploaded to HP Support Center website. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA08-190B Multiple DNS implementations vulnerable to cache poisoning Original release date: July 08, 2008 Last revised: -- Source: US-CERT Systems Affected Systems implementing: * Caching DNS resolvers * DNS stub resolvers Affected systems include both client and server systems, and any other networked systems that include this functionality. Effective attack techniques against these vulnerabilities have been demonstrated. I. Examples of these vulnerabilities can be found in Vulnerability Note VU#800113. Recent research into these and other related vulnerabilities has produced extremely effective exploitation methods to achieve cache poisoning. Tools and techniques have been developed that can reliably poison a domain of the attacker's choosing on most current implementations. As a result, the consensus of DNS software implementers is to implement source port randomization in their resolvers as a mitigation. US-CERT is tracking this issue as VU#800113. This reference number corresponds to CVE-2008-1447. II. Impact An attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control. III. Solution Apply a patch from your vendor Patches have been released by a number of vendors to implement source port randomization in the nameserver. This change significantly reduces the practicality of cache poisoning attacks. Please see the Systems Affected section of Vulnerability Note VU#800113 for additional details for specific vendors. As mentioned above, stub resolvers are also vulnerable to these attacks. Stub resolvers that will issue queries in response to attacker behavior, and may receive packets from an attacker, should be patched. System administrators should be alert for patches to client operating systems that implement port randomization in the stub resolver. Workarounds Restrict access Administrators, particularly those who are unable to apply a patch, can limit exposure to this vulnerability by restricting sources that can ask for recursion. Note that restricting access will still allow attackers with access to authorized hosts to exploit this vulnerability. Filter traffic at network perimeters Because the ability to spoof IP addresses is necessary to conduct these attacks, administrators should take care to filter spoofed addresses at the network perimeter. IETF Request for Comments (RFC) documents RFC 2827, RFC 3704, and RFC 3013 describe best current practices (BCPs) for implementing this defense. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate. Run a local DNS cache In lieu of strong port randomization characteristics in a stub resolver, administrators can protect their systems by using local caching full-service resolvers, both on the client systems and on servers that are topologically close on the network to the client systems. This should be done in conjunction with the network segmentation and filtering strategies mentioned above. Disable recursion Disable recursion on any nameserver responding to DNS requests made by untrusted systems. Implement source port randomization Vendors that implement DNS software are encouraged to review IETF Internet Draft, "Measures for making DNS more resilient against forged answers," for additional information about implementing mitigations in their products. This document is a work in progress and may change prior to its publication as an RFC, if it is approved. IV. References * US-CERT Vulnerability Note VU#800113 - <http://www.kb.cert.org/vuls/id/800113> * US-CERT Vulnerability Note VU#484649 - <http://www.kb.cert.org/vuls/id/484649> * US-CERT Vulnerability Note VU#252735 - <http://www.kb.cert.org/vuls/id/252735> * US-CERT Vulnerability Note VU#927905 - <http://www.kb.cert.org/vuls/id/927905> * US-CERT Vulnerability Note VU#457875 - <http://www.kb.cert.org/vuls/id/457875> * Internet Draft: Measures for making DNS more resilient against forged answers - <http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience> * RFC 3833 - <http://tools.ietf.org/html/rfc3833> * RFC 2827 - <http://tools.ietf.org/html/rfc2827> * RFC 3704 - <http://tools.ietf.org/html/rfc3704> * RFC 3013 - <http://tools.ietf.org/html/rfc3013> * Microsoft Security Bulletin MS08-037 - <http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx> * Internet Systems Consortium BIND Vulnerabilities - <http://www.isc.org/sw/bind/bind-security.php> ____________________________________________________________________ US-CERT thanks Dan Kaminsky of IOActive and Paul Vixie of Internet Systems Consortium (ISC) for notifying us about this problem and for helping us to construct this advisory. ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA08-190B.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. ____________________________________________________________________ Produced 2008 by US-CERT, a government organization. There are two ways to deal with this situation: 1. The documentation included with BIND 9 contains a migration guide. Configure the BIND 8 resolver to forward queries to a BIND 9 resolver. Provided that the network between both resolvers is trusted, this protects the BIND 8 resolver from cache poisoning attacks (to the same degree that the BIND 9 resolver is protected). This problem does not apply to BIND 8 when used exclusively as an authoritative DNS server. BIND 8 (that is, the bind package) will be removed from the etch distribution in a future point release. Some of these vulnerabilities may be pertinent to the SMA, please check the table in the Resolution section of this Security Bulletin. References: MS08-037 (CVE-2008-1447, CVE-2008-1454), MS08-038 (CVE-2008-1435), MS08-039 (CVE-2008-2247, CVE-2008-2248), MS08-040 (CVE-2008-0085, CVE-2008-0086, CVE-2008-0106, CVE-2008-0107). Patches released by Microsoft after MS06-051 are covered by monthly Security Bulletins. For the full archived list of Microsoft security updates applicable for Storage Management Appliance software v2.1, please refer to the following Security Bulletins available on the IT Resource Center (ITRC) Web site: http://www.itrc.hp.com/service/cki/secBullArchive.do For patches released by Microsoft in 2003, MS03-001 to MS03-051 refer to Security Bulletin HPSBST02146 For patches released by Microsoft in 2004, MS04-001 to MS04-045 refer to Security Bulletin HPSBST02147 For patches released by Microsoft in 2005, MS05-001 to MS05-055 refer to Security Bulletin HPSBST02148 For patches released by Microsoft in 2006, MS06-001 to MS06-051 refer to Security Bulletin HPSBST02140 The Microsoft patch index archive and further details about all Microsoft patches can be found on the following Web site: http://www.microsoft.com/technet/security/bulletin/summary.mspx NOTE: The SMA must have all pertinent SMA Service Packs applied Windows 2000 Update Rollup 1 Customers are advised to download and install the Windows 2000 Update Rollup 1 for Service Pack 4 on SMA v2.1. For more information please refer to the Windows 2000 Update Rollup 1 for Service Pack 4 and Storage Management Appliance v2.1 advisory at the following website: http://h20000.www2.hp.com/bizsupport/TechSupport/DocumentIndex.jsp?contentType=SupportManual&lang=en&cc=us&docIndexId=179111&taskId=101&prodTypeId=12169&prodSeriesId=315667 Windows 2000 Update Rollup 1 for SP4 does not include security updates released after April 30, 2005 starting from MS05-026. It also does not include patches MS04-003 and MS04-028. NOTE: Patch installation instructions are shown at the end of this table. ------------------------------------------------- MS Patch - MS08-037 Vulnerabilities in DNS Could Allow Spoofing (953230) Analysis - Patch will run successfully. ------------------------------------------------- MS Patch - MS08-038 Vulnerability in Windows Explorer Could Allow Remote Code Execution (950582) Analysis - SMA does not have this component. Action - Patch will not run successfully. Customers should not be concerned with this issue ------------------------------------------------- MS Patch - MS08-039 Vulnerabilities in Outlook Web Access for Exchange Server Could Allow Elevation of Privilege (953747) Analysis - SMA does not have this component. Action - Patch will not run successfully. Customers should not be concerned with this issue ------------------------------------------------- MS Patch - MS08-040 Vulnerabilities in Microsoft SQL Server Could Allow Elevation of Privilege (941203) Analysis - SMA does not have this component. Action - Patch will not run successfully. Customers should not be concerned with this issue ------------------------------------------------- Installation Instructions: (if applicable) Download patches to a system other than the SMA Copy the patch to a floppy diskette or to a CD Execute the patch by using Terminal Services to the SMA or by attaching a keyboard, monitor and mouse to the SMA. Note: The Microsoft Windows Installer 3.1 is supported on SMA v2.1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01506861 Version: 6 HPSBUX02351 SSRT080058 rev.6 - HP-UX Running BIND, Remote DNS Cache Poisoning NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2008-07-16 Last Updated: 2010-12-15 ----------------------------------------------------------------------------- Potential Security Impact: Remote DNS cache poisoning Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running BIND. References: CVE-2008-1447 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running BIND v9.3.2 or BIND v9.2.0, HP-UX B.11.11 running BIND v8.1.2 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2008-1447 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following software updates / patch to resolve the vulnerabilities for BIND v9.2.0 and BIND v9.3.2. Customers running BIND v8.1.2 on HP-UX B.11.11 should upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below. A new BIND v9.2.0 depot is available to address an issue encountered on HP-UX B.11.11. The new depot is available by contacting HP Support. The BIND v9.3.2 updates are available for download from: http://software.hp.com The patch PHNE_37865 is available from: http://itrc.hp.com HP-UX Release / Action B.11.11 running v8.1.2 / Upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. HP-UX Release / BIND Depot name / Action B.11.11 running v9.2.0 / BIND920V15.depot / Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. HP-UX Release / Action B.11.23 running v9.2.0 / Install PHNE_37865 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. HP-UX Release / Action B.11.11 running v9.3.2 / Install revision C.9.3.2.7.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. B.11.23 running v9.3.2 / Install revision C.9.3.2.7.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. B.11.31 running v9.3.2 / Install revision C.9.3.2.3.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Note: Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Note: Firewall configurations may need to be adjusted to allow DNS queries from random source ports to pass. In addition, firewalls that forward DNS queries must not replace the random source ports. MANUAL ACTIONS: Yes - NonUpdate Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Check firewall settings. For B.11.11 running v8.1.2, upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates For B.11.11 running v9.2.0 install BIND920v15.depot PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa AFFECTED VERSIONS For BIND v8.1.2 HP-UX B.11.11 ============= InternetSrvcs.INETSVCS-RUN action: upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. For BIND v9.3.2 HP-UX B.11.11 ============= BindUpgrade.BIND-UPGRADE action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com HP-UX B.11.23 ============= BindUpgrade.BIND-UPGRADE BindUpgrade.BIND2-UPGRADE action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com HP-UX B.11.31 ============= NameService.BIND-AUX NameService.BIND-RUN action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com For BIND v9.2.0 HP-UX B.11.11 ============= BINDv920.INETSVCS-BIND action: install revision B.11.11.01.015 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL Contact HP Support for information on where to download depot. HP-UX B.11.23 ============= InternetSrvcs.INETSVCS-INETD InternetSrvcs.INETSVCS-RUN InternetSrvcs.INETSVCS2-RUN action: install patch PHNE_37865 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://itrc.hp.com END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 16 July 2008 Initial release Version:2 (rev.2) - 19 July 2008 Added BIND v9.2.0 depot information Version:3 (rev.3) - 06 August 2008 Updated patch location, revised BIND v9.2.0 depot information, added BIND v8.1.2 Version:4 (rev.4) - 08 August 2008 Updated manual actions to include named.conf and firewall configuration setings Version:5 (rev.5) - 12 October 2010 Updated version for BIND v9.2.0 depot for B.11.11 Version:6 (rev.6) - 15 December 2010 Reformat v9.2.0 recommendation for clarity. Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk0JQB8ACgkQ4B86/C0qfVmfGwCeOT1oSjH7NZVlEmixFnjM5hWp gtAAnj1pfPTQUHenOf3lzoRYLUEoy6xf =/E+O -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Red Hat update for bind SECUNIA ADVISORY ID: SA26195 VERIFY ADVISORY: http://secunia.com/advisories/26195/ CRITICAL: Moderately critical IMPACT: Spoofing WHERE: >From remote OPERATING SYSTEM: Red Hat Enterprise Linux (v. 5 server) http://secunia.com/product/13652/ Red Hat Enterprise Linux Desktop (v. 5 client) http://secunia.com/product/13653/ Red Hat Enterprise Linux Desktop Workstation (v. 5 client) http://secunia.com/product/13651/ RedHat Enterprise Linux AS 2.1 http://secunia.com/product/48/ RedHat Enterprise Linux AS 3 http://secunia.com/product/2534/ RedHat Enterprise Linux AS 4 http://secunia.com/product/4669/ RedHat Enterprise Linux ES 2.1 http://secunia.com/product/1306/ RedHat Enterprise Linux ES 3 http://secunia.com/product/2535/ RedHat Enterprise Linux ES 4 http://secunia.com/product/4668/ RedHat Enterprise Linux WS 3 http://secunia.com/product/2536/ RedHat Enterprise Linux WS 2.1 http://secunia.com/product/1044/ RedHat Enterprise Linux WS 4 http://secunia.com/product/4670/ RedHat Linux Advanced Workstation 2.1 for Itanium http://secunia.com/product/1326/ DESCRIPTION: Red Hat has issued an update for bind. For more information: SA26152 SOLUTION: Updated packages are available from Red Hat Network. http://rhn.redhat.com ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2007-0740.html OTHER REFERENCES: SA26152: http://secunia.com/advisories/26152/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ SUSE Security Announcement Package: bind Announcement ID: SUSE-SA:2008:033 Date: Fri, 11 Jul 2008 09:00:00 +0000 Affected Products: openSUSE 10.2 openSUSE 10.3 openSUSE 11.0 SUSE SLES 9 Novell Linux Desktop 9 Open Enterprise Server Novell Linux POS 9 SUSE Linux Enterprise Desktop 10 SP1 SLE SDK 10 SP1 SLE SDK 10 SP2 SUSE Linux Enterprise Server 10 SP1 SUSE Linux Enterprise Desktop 10 SP2 SUSE Linux Enterprise Server 10 SP2 Vulnerability Type: DNS cache poisoning Severity (1-10): 9 SUSE Default Package: no Cross-References: CVE-2008-1447 Content of This Advisory: 1) Security Vulnerability Resolved: DNS cache poisoning 2) Solution or Work-Around 3) Special Instructions and Notes 4) Package Location and Checksums 5) Pending Vulnerabilities, Solutions, and Work-Arounds: 6) Authenticity Verification and Additional Information ______________________________________________________________________________ 1) Problem Description and Brief Discussion The bind daemon is responsible for resolving hostnames in IP addresses and vice versa. The new version of bind uses a random transaction-ID (TRXID) and a random UDP source-port for DNS queries to address DNS cache poisoning attacks possible because of the "birthday paradox" and an attack discovered by Dan Kaminsky. Unfortunately we do not have details about Kaminsky's attack and have to trust the statement that a random UDP source-port is sufficient to stop it. DNS servers that do not support recursive queries or do not use a cache (authoritative only servers) are not vulnerable too. Update packages of bind9 for SLES8 will be available soon. The glibc stub resolver is known to be vulnerable too and we will publish updates as soon as possible. Note, a local attacker can always sniff DNS queries and generate spoofed responses easily. If you use the UDP source-port number of the DNS server in your firewall configuration, for example to let DNS queries through your packetfilter, then you have to take steps to adapt your filter rules to the new behavior of the DNS server. One that is authoritative only and accessible from the Internet to resolve queries for your local systems that are available over the Internet. The other system (caching) is not accessible over the Internet and can be used by internal clients to recursively lookup names and addresses. But we encourage you to install the bind update as soon as possible too. If you use the latest update of pdns-recursor you are not vulnerable to this attack. For the glibc stub resolver bug you can install a local secure DNS for- warder on your machine or make a DNS forwarder available for a protected network. 3) Special Instructions and Notes Please restart the bind daemon after the update. 4) Package Location and Checksums The preferred method for installing security updates is to use the YaST Online Update (YOU) tool. YOU detects which updates are required and automatically performs the necessary steps to verify and install them. Alternatively, download the update packages for your distribution manually and verify their integrity by the methods listed in Section 6 of this announcement. Then install the packages using the command rpm -Fhv <file.rpm> to apply the update, replacing <file.rpm> with the filename of the downloaded RPM package. x86 Platform: openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-chrootenv-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-devel-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-doc-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-libs-9.4.2-39.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-utils-9.4.2-39.2.i586.rpm openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-chrootenv-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-devel-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-doc-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-libs-9.4.1.P1-12.5.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-utils-9.4.1.P1-12.5.i586.rpm openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-chrootenv-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-devel-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-doc-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-libs-9.3.5P1-0.1.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/bind-utils-9.3.5P1-0.1.i586.rpm x86-64 Platform: openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/bind-libs-32bit-9.4.2-39.2.x86_64.rpm openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/bind-libs-32bit-9.4.1.P1-12.5.x86_64.rpm openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/bind-libs-32bit-9.3.5P1-0.1.x86_64.rpm Sources: openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/bind-9.4.2-39.2.src.rpm openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/bind-9.4.1.P1-12.5.src.rpm openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/bind-9.3.5P1-0.1.src.rpm Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web: Open Enterprise Server http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html Novell Linux POS 9 http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html Novell Linux Desktop 9 http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html SUSE SLES 9 http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html SUSE Linux Enterprise Server 10 SP1 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SUSE Linux Enterprise Server 10 SP2 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SLE SDK 10 SP2 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SUSE Linux Enterprise 10 SP2 DEBUGINFO http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SLE SDK 10 SP1 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SUSE Linux Enterprise Desktop 10 SP1 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html SUSE Linux Enterprise Desktop 10 SP2 http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html ______________________________________________________________________________ 5) Pending Vulnerabilities, Solutions, and Work-Arounds: none ______________________________________________________________________________ 6) Authenticity Verification and Additional Information - Announcement authenticity verification: SUSE security announcements are published via mailing lists and on Web sites. The authenticity and integrity of a SUSE security announcement is guaranteed by a cryptographic signature in each announcement. All SUSE security announcements are published with a valid signature. To verify the signature of the announcement, save it as text into a file and run the command gpg --verify <file> replacing <file> with the name of the file where you saved the announcement. The output for a valid signature looks like: gpg: Signature made <DATE> using RSA key ID 3D25D3D9 gpg: Good signature from "SuSE Security Team <security@suse.de>" where <DATE> is replaced by the date the document was signed. If the security team's key is not contained in your key ring, you can import it from the first installation CD. To import the key, use the command gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc - Package authenticity verification: SUSE update packages are available on many mirror FTP servers all over the world. While this service is considered valuable and important to the free and open source software community, the authenticity and the integrity of a package needs to be verified to ensure that it has not been tampered with. The internal rpm package signatures provide an easy way to verify the authenticity of an RPM package. Use the command rpm -v --checksig <file.rpm> to verify the signature of the package, replacing <file.rpm> with the filename of the RPM package downloaded. The package is unmodified if it contains a valid signature from build@suse.de with the key ID 9C800ACA. This key is automatically imported into the RPM database (on RPMv4-based distributions) and the gpg key ring of 'root' during installation. You can also find it on the first installation CD and at the end of this announcement. - SUSE runs two security mailing lists to which any interested party may subscribe: opensuse-security@opensuse.org - General Linux and SUSE security discussion. All SUSE security announcements are sent to this list. To subscribe, send an e-mail to <opensuse-security+subscribe@opensuse.org>. opensuse-security-announce@opensuse.org - SUSE's announce-only mailing list. Only SUSE's security announcements are sent to this list. To subscribe, send an e-mail to <opensuse-security-announce+subscribe@opensuse.org>. ===================================================================== SUSE's security contact is <security@suse.com> or <security@suse.de>. The <security@suse.de> public key is listed below. ===================================================================== ______________________________________________________________________________ The information in this advisory may be distributed or reproduced, provided that the advisory is not modified in any way. In particular, the clear text signature should show proof of the authenticity of the text. SUSE Linux Products GmbH provides no warranties of any kind whatsoever with respect to the information contained in this security advisory. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 3.69

sources: NVD: CVE-2008-1447 // CERT/CC: VU#252735 // CERT/CC: VU#800113 // PACKETSTORM: 74443 // PACKETSTORM: 68412 // PACKETSTORM: 68129 // PACKETSTORM: 70207 // PACKETSTORM: 73732 // PACKETSTORM: 68691 // VULHUB: VHN-31572 // PACKETSTORM: 68878 // PACKETSTORM: 129616 // PACKETSTORM: 68061 // PACKETSTORM: 68037 // PACKETSTORM: 68199 // PACKETSTORM: 96747 // PACKETSTORM: 58035 // PACKETSTORM: 68118

AFFECTED PRODUCTS

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:fujitsumodel: - scope: - version: -

Trust: 1.6

vendor:internet consortiummodel: - scope: - version: -

Trust: 1.6

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:red hatmodel: - scope: - version: -

Trust: 1.6

vendor:suse linuxmodel: - scope: - version: -

Trust: 1.6

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 1.6

vendor:ubuntumodel: - scope: - version: -

Trust: 1.6

vendor:iscmodel:bindscope:eqversion:8

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:4

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.2.9

Trust: 1.0

vendor:alcatel lucentmodel: - scope: - version: -

Trust: 0.8

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:bluecatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:force10model: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:funkwerkmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:infobloxmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:nixumodel: - scope: - version: -

Trust: 0.8

vendor:nominummodel: - scope: - version: -

Trust: 0.8

vendor:nortelmodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:qnxmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:wind rivermodel: - scope: - version: -

Trust: 0.8

vendor:yamahamodel: - scope: - version: -

Trust: 0.8

vendor:dnsmasqmodel: - scope: - version: -

Trust: 0.8

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 0.6

vendor:redhatmodel:enterprise linuxscope:eqversion:2.1

Trust: 0.6

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 0.6

vendor:redhatmodel:linux advanced workstationscope:eqversion:2.1

Trust: 0.6

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // CNNVD: CNNVD-200807-129 // NVD: CVE-2008-1447

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1447
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#800113
value: 27.54

Trust: 0.8

CARNEGIE MELLON: VU#252735
value: 3.83

Trust: 0.8

CNNVD: CNNVD-200807-129
value: MEDIUM

Trust: 0.6

VULHUB: VHN-31572
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-31572
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2008-1447
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // CNNVD: CNNVD-200807-129 // NVD: CVE-2008-1447

PROBLEMTYPE DATA

problemtype:CWE-331

Trust: 1.1

problemtype:CWE-310

Trust: 0.1

sources: VULHUB: VHN-31572 // NVD: CVE-2008-1447

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 68412 // CNNVD: CNNVD-200807-129

TYPE

security feature problem

Trust: 0.6

sources: CNNVD: CNNVD-200807-129

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-31572

EXTERNAL IDS

db:NVDid:CVE-2008-1447

Trust: 3.0

db:CERT/CCid:VU#800113

Trust: 2.6

db:USCERTid:TA08-190B

Trust: 1.8

db:VUPENid:ADV-2008-2025

Trust: 1.7

db:VUPENid:ADV-2009-0297

Trust: 1.7

db:VUPENid:ADV-2008-2334

Trust: 1.7

db:VUPENid:ADV-2008-2383

Trust: 1.7

db:VUPENid:ADV-2008-2113

Trust: 1.7

db:VUPENid:ADV-2008-2558

Trust: 1.7

db:VUPENid:ADV-2008-2019

Trust: 1.7

db:VUPENid:ADV-2008-2377

Trust: 1.7

db:VUPENid:ADV-2008-2584

Trust: 1.7

db:VUPENid:ADV-2008-2342

Trust: 1.7

db:VUPENid:ADV-2010-0622

Trust: 1.7

db:VUPENid:ADV-2008-2166

Trust: 1.7

db:VUPENid:ADV-2008-2051

Trust: 1.7

db:VUPENid:ADV-2008-2092

Trust: 1.7

db:VUPENid:ADV-2008-2029

Trust: 1.7

db:VUPENid:ADV-2008-2384

Trust: 1.7

db:VUPENid:ADV-2008-2268

Trust: 1.7

db:VUPENid:ADV-2008-2052

Trust: 1.7

db:VUPENid:ADV-2008-2549

Trust: 1.7

db:VUPENid:ADV-2008-2197

Trust: 1.7

db:VUPENid:ADV-2009-0311

Trust: 1.7

db:VUPENid:ADV-2008-2055

Trust: 1.7

db:VUPENid:ADV-2008-2467

Trust: 1.7

db:VUPENid:ADV-2008-2123

Trust: 1.7

db:VUPENid:ADV-2008-2482

Trust: 1.7

db:VUPENid:ADV-2008-2525

Trust: 1.7

db:VUPENid:ADV-2008-2023

Trust: 1.7

db:VUPENid:ADV-2008-2582

Trust: 1.7

db:VUPENid:ADV-2008-2114

Trust: 1.7

db:VUPENid:ADV-2008-2196

Trust: 1.7

db:VUPENid:ADV-2008-2139

Trust: 1.7

db:VUPENid:ADV-2008-2466

Trust: 1.7

db:VUPENid:ADV-2008-2050

Trust: 1.7

db:VUPENid:ADV-2008-2195

Trust: 1.7

db:VUPENid:ADV-2008-2291

Trust: 1.7

db:VUPENid:ADV-2008-2030

Trust: 1.7

db:SECTRACKid:1020548

Trust: 1.7

db:SECTRACKid:1020578

Trust: 1.7

db:SECTRACKid:1020448

Trust: 1.7

db:SECTRACKid:1020558

Trust: 1.7

db:SECTRACKid:1020702

Trust: 1.7

db:SECTRACKid:1020440

Trust: 1.7

db:SECTRACKid:1020575

Trust: 1.7

db:SECTRACKid:1020437

Trust: 1.7

db:SECTRACKid:1020802

Trust: 1.7

db:SECTRACKid:1020449

Trust: 1.7

db:SECTRACKid:1020579

Trust: 1.7

db:SECTRACKid:1020561

Trust: 1.7

db:SECTRACKid:1020804

Trust: 1.7

db:SECTRACKid:1020577

Trust: 1.7

db:SECTRACKid:1020560

Trust: 1.7

db:SECTRACKid:1020651

Trust: 1.7

db:SECTRACKid:1020653

Trust: 1.7

db:SECTRACKid:1020438

Trust: 1.7

db:SECTRACKid:1020576

Trust: 1.7

db:SECUNIAid:31209

Trust: 1.7

db:SECUNIAid:31197

Trust: 1.7

db:SECUNIAid:31422

Trust: 1.7

db:SECUNIAid:30977

Trust: 1.7

db:SECUNIAid:31151

Trust: 1.7

db:SECUNIAid:31354

Trust: 1.7

db:SECUNIAid:31093

Trust: 1.7

db:SECUNIAid:31212

Trust: 1.7

db:SECUNIAid:31207

Trust: 1.7

db:SECUNIAid:31221

Trust: 1.7

db:SECUNIAid:31254

Trust: 1.7

db:SECUNIAid:31451

Trust: 1.7

db:SECUNIAid:31169

Trust: 1.7

db:SECUNIAid:30988

Trust: 1.7

db:SECUNIAid:30973

Trust: 1.7

db:SECUNIAid:31687

Trust: 1.7

db:SECUNIAid:31199

Trust: 1.7

db:SECUNIAid:30980

Trust: 1.7

db:SECUNIAid:31137

Trust: 1.7

db:SECUNIAid:30998

Trust: 1.7

db:SECUNIAid:31014

Trust: 1.7

db:SECUNIAid:31065

Trust: 1.7

db:SECUNIAid:31882

Trust: 1.7

db:SECUNIAid:31019

Trust: 1.7

db:SECUNIAid:31153

Trust: 1.7

db:SECUNIAid:31482

Trust: 1.7

db:SECUNIAid:31495

Trust: 1.7

db:SECUNIAid:33178

Trust: 1.7

db:SECUNIAid:33714

Trust: 1.7

db:SECUNIAid:31213

Trust: 1.7

db:SECUNIAid:31326

Trust: 1.7

db:SECUNIAid:31052

Trust: 1.7

db:SECUNIAid:31011

Trust: 1.7

db:SECUNIAid:31588

Trust: 1.7

db:SECUNIAid:31033

Trust: 1.7

db:SECUNIAid:31031

Trust: 1.7

db:SECUNIAid:31430

Trust: 1.7

db:SECUNIAid:30979

Trust: 1.7

db:SECUNIAid:31022

Trust: 1.7

db:SECUNIAid:31094

Trust: 1.7

db:SECUNIAid:31030

Trust: 1.7

db:SECUNIAid:31204

Trust: 1.7

db:SECUNIAid:30925

Trust: 1.7

db:SECUNIAid:31072

Trust: 1.7

db:SECUNIAid:31152

Trust: 1.7

db:SECUNIAid:31237

Trust: 1.7

db:SECUNIAid:31012

Trust: 1.7

db:SECUNIAid:33786

Trust: 1.7

db:SECUNIAid:31143

Trust: 1.7

db:SECUNIAid:31236

Trust: 1.7

db:SECUNIAid:31900

Trust: 1.7

db:SECUNIAid:30989

Trust: 1.7

db:SECUNIAid:31823

Trust: 1.7

db:USCERTid:TA08-260A

Trust: 1.7

db:USCERTid:TA08-190A

Trust: 1.7

db:BIDid:30131

Trust: 1.7

db:EXPLOIT-DBid:6130

Trust: 1.7

db:EXPLOIT-DBid:6123

Trust: 1.7

db:EXPLOIT-DBid:6122

Trust: 1.7

db:SECUNIAid:26195

Trust: 0.9

db:CERT/CCid:VU#252735

Trust: 0.9

db:EXPLOIT-DBid:4266

Trust: 0.8

db:CNNVDid:CNNVD-200807-129

Trust: 0.6

db:PACKETSTORMid:68878

Trust: 0.2

db:PACKETSTORMid:68412

Trust: 0.2

db:PACKETSTORMid:68118

Trust: 0.2

db:PACKETSTORMid:68061

Trust: 0.2

db:PACKETSTORMid:74443

Trust: 0.2

db:PACKETSTORMid:96747

Trust: 0.2

db:PACKETSTORMid:68199

Trust: 0.2

db:PACKETSTORMid:73732

Trust: 0.2

db:PACKETSTORMid:70207

Trust: 0.2

db:PACKETSTORMid:68691

Trust: 0.2

db:PACKETSTORMid:68037

Trust: 0.2

db:PACKETSTORMid:68129

Trust: 0.2

db:PACKETSTORMid:68038

Trust: 0.1

db:PACKETSTORMid:68755

Trust: 0.1

db:PACKETSTORMid:73060

Trust: 0.1

db:PACKETSTORMid:68502

Trust: 0.1

db:PACKETSTORMid:68288

Trust: 0.1

db:PACKETSTORMid:94774

Trust: 0.1

db:PACKETSTORMid:68183

Trust: 0.1

db:PACKETSTORMid:68068

Trust: 0.1

db:PACKETSTORMid:68471

Trust: 0.1

db:PACKETSTORMid:68039

Trust: 0.1

db:PACKETSTORMid:68036

Trust: 0.1

db:PACKETSTORMid:68500

Trust: 0.1

db:PACKETSTORMid:68360

Trust: 0.1

db:PACKETSTORMid:68473

Trust: 0.1

db:PACKETSTORMid:68546

Trust: 0.1

db:PACKETSTORMid:68554

Trust: 0.1

db:PACKETSTORMid:68063

Trust: 0.1

db:PACKETSTORMid:68543

Trust: 0.1

db:SEEBUGid:SSVID-65607

Trust: 0.1

db:VULHUBid:VHN-31572

Trust: 0.1

db:PACKETSTORMid:129616

Trust: 0.1

db:CERT/CCid:VU#484649

Trust: 0.1

db:CERT/CCid:VU#457875

Trust: 0.1

db:CERT/CCid:VU#927905

Trust: 0.1

db:PACKETSTORMid:58035

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // PACKETSTORM: 74443 // PACKETSTORM: 68412 // PACKETSTORM: 68129 // PACKETSTORM: 70207 // PACKETSTORM: 73732 // PACKETSTORM: 68691 // PACKETSTORM: 68118 // PACKETSTORM: 68878 // PACKETSTORM: 129616 // PACKETSTORM: 68061 // PACKETSTORM: 68037 // PACKETSTORM: 68199 // PACKETSTORM: 96747 // PACKETSTORM: 58035 // CNNVD: CNNVD-200807-129 // NVD: CVE-2008-1447

REFERENCES

url:http://support.citrix.com/article/ctx117991

Trust: 2.3

url:http://support.citrix.com/article/ctx118183

Trust: 2.3

url:http://security.gentoo.org/glsa/glsa-200807-08.xml

Trust: 1.8

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26667

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26668

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26669

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26670

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26671

Trust: 1.7

url:http://www.ibm.com/support/docview.wss?uid=isg1iz26672

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00003.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00004.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00005.html

Trust: 1.7

url:http://www.securityfocus.com/bid/30131

Trust: 1.7

url:http://www.securityfocus.com/archive/1/495289/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/495869/100/0/threaded

Trust: 1.7

url:http://www.us-cert.gov/cas/techalerts/ta08-190a.html

Trust: 1.7

url:http://www.us-cert.gov/cas/techalerts/ta08-190b.html

Trust: 1.7

url:http://www.us-cert.gov/cas/techalerts/ta08-260a.html

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/800113

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00809c2168.shtml

Trust: 1.7

url:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401

Trust: 1.7

url:http://support.apple.com/kb/ht3026

Trust: 1.7

url:http://support.apple.com/kb/ht3129

Trust: 1.7

url:http://up2date.astaro.com/2008/08/up2date_7202_released.html

Trust: 1.7

url:http://wiki.rpath.com/wiki/advisories:rpsa-2008-0231

Trust: 1.7

url:http://wiki.rpath.com/wiki/advisories:rpsa-2010-0018

Trust: 1.7

url:http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning

Trust: 1.7

url:http://www.isc.org/index.pl?/sw/bind/bind-security.php

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/mimg-7dwr4j

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/mimg-7ecl8q

Trust: 1.7

url:http://www.novell.com/support/viewcontent.do?externalid=7000912

Trust: 1.7

url:http://www.phys.uu.nl/~rombouts/pdnsd.html

Trust: 1.7

url:http://www.phys.uu.nl/~rombouts/pdnsd/changelog

Trust: 1.7

url:http://www.rtpro.yamaha.co.jp/rt/faq/security/vu800113.html

Trust: 1.7

url:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/

Trust: 1.7

url:http://www.vmware.com/security/advisories/vmsa-2008-0014.html

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1603

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1604

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1605

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1619

Trust: 1.7

url:http://www.debian.org/security/2008/dsa-1623

Trust: 1.7

url:https://www.exploit-db.com/exploits/6122

Trust: 1.7

url:https://www.exploit-db.com/exploits/6123

Trust: 1.7

url:https://www.exploit-db.com/exploits/6130

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00402.html

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00458.html

Trust: 1.7

url:http://security.freebsd.org/advisories/freebsd-sa-08:06.bind.asc

Trust: 1.7

url:http://lists.grok.org.uk/pipermail/full-disclosure/2008-august/064118.html

Trust: 1.7

url:http://security.gentoo.org/glsa/glsa-200812-17.xml

Trust: 1.7

url:http://security.gentoo.org/glsa/glsa-201209-25.xml

Trust: 1.7

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01662368

Trust: 1.7

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01523520

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2008:139

Trust: 1.7

url:http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html

Trust: 1.7

url:http://www.caughq.org/exploits/cau-ex-2008-0002.txt

Trust: 1.7

url:http://www.caughq.org/exploits/cau-ex-2008-0003.txt

Trust: 1.7

url:http://www.doxpara.com/?p=1176

Trust: 1.7

url:http://www.doxpara.com/dmk_bo2k8.ppt

Trust: 1.7

url:http://www.nominum.com/asset_upload_file741_2661.pdf

Trust: 1.7

url:http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html

Trust: 1.7

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037

Trust: 1.7

url:http://www.openbsd.org/errata42.html#013_bind

Trust: 1.7

url:http://www.openbsd.org/errata43.html#004_bind

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12117

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5725

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5761

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5917

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9627

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2008-0533.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2008-0789.html

Trust: 1.7

url:http://www.securitytracker.com/id?1020437

Trust: 1.7

url:http://www.securitytracker.com/id?1020438

Trust: 1.7

url:http://www.securitytracker.com/id?1020440

Trust: 1.7

url:http://www.securitytracker.com/id?1020448

Trust: 1.7

url:http://www.securitytracker.com/id?1020449

Trust: 1.7

url:http://www.securitytracker.com/id?1020548

Trust: 1.7

url:http://www.securitytracker.com/id?1020558

Trust: 1.7

url:http://www.securitytracker.com/id?1020560

Trust: 1.7

url:http://www.securitytracker.com/id?1020561

Trust: 1.7

url:http://www.securitytracker.com/id?1020575

Trust: 1.7

url:http://www.securitytracker.com/id?1020576

Trust: 1.7

url:http://www.securitytracker.com/id?1020577

Trust: 1.7

url:http://www.securitytracker.com/id?1020578

Trust: 1.7

url:http://www.securitytracker.com/id?1020579

Trust: 1.7

url:http://www.securitytracker.com/id?1020651

Trust: 1.7

url:http://www.securitytracker.com/id?1020653

Trust: 1.7

url:http://www.securitytracker.com/id?1020702

Trust: 1.7

url:http://www.securitytracker.com/id?1020802

Trust: 1.7

url:http://www.securitytracker.com/id?1020804

Trust: 1.7

url:http://secunia.com/advisories/30925

Trust: 1.7

url:http://secunia.com/advisories/30973

Trust: 1.7

url:http://secunia.com/advisories/30977

Trust: 1.7

url:http://secunia.com/advisories/30979

Trust: 1.7

url:http://secunia.com/advisories/30980

Trust: 1.7

url:http://secunia.com/advisories/30988

Trust: 1.7

url:http://secunia.com/advisories/30989

Trust: 1.7

url:http://secunia.com/advisories/30998

Trust: 1.7

url:http://secunia.com/advisories/31011

Trust: 1.7

url:http://secunia.com/advisories/31012

Trust: 1.7

url:http://secunia.com/advisories/31014

Trust: 1.7

url:http://secunia.com/advisories/31019

Trust: 1.7

url:http://secunia.com/advisories/31022

Trust: 1.7

url:http://secunia.com/advisories/31030

Trust: 1.7

url:http://secunia.com/advisories/31031

Trust: 1.7

url:http://secunia.com/advisories/31033

Trust: 1.7

url:http://secunia.com/advisories/31052

Trust: 1.7

url:http://secunia.com/advisories/31065

Trust: 1.7

url:http://secunia.com/advisories/31072

Trust: 1.7

url:http://secunia.com/advisories/31093

Trust: 1.7

url:http://secunia.com/advisories/31094

Trust: 1.7

url:http://secunia.com/advisories/31137

Trust: 1.7

url:http://secunia.com/advisories/31143

Trust: 1.7

url:http://secunia.com/advisories/31151

Trust: 1.7

url:http://secunia.com/advisories/31152

Trust: 1.7

url:http://secunia.com/advisories/31153

Trust: 1.7

url:http://secunia.com/advisories/31169

Trust: 1.7

url:http://secunia.com/advisories/31197

Trust: 1.7

url:http://secunia.com/advisories/31199

Trust: 1.7

url:http://secunia.com/advisories/31204

Trust: 1.7

url:http://secunia.com/advisories/31207

Trust: 1.7

url:http://secunia.com/advisories/31209

Trust: 1.7

url:http://secunia.com/advisories/31212

Trust: 1.7

url:http://secunia.com/advisories/31213

Trust: 1.7

url:http://secunia.com/advisories/31221

Trust: 1.7

url:http://secunia.com/advisories/31236

Trust: 1.7

url:http://secunia.com/advisories/31237

Trust: 1.7

url:http://secunia.com/advisories/31254

Trust: 1.7

url:http://secunia.com/advisories/31326

Trust: 1.7

url:http://secunia.com/advisories/31354

Trust: 1.7

url:http://secunia.com/advisories/31422

Trust: 1.7

url:http://secunia.com/advisories/31430

Trust: 1.7

url:http://secunia.com/advisories/31451

Trust: 1.7

url:http://secunia.com/advisories/31482

Trust: 1.7

url:http://secunia.com/advisories/31495

Trust: 1.7

url:http://secunia.com/advisories/31588

Trust: 1.7

url:http://secunia.com/advisories/31687

Trust: 1.7

url:http://secunia.com/advisories/31823

Trust: 1.7

url:http://secunia.com/advisories/31882

Trust: 1.7

url:http://secunia.com/advisories/31900

Trust: 1.7

url:http://secunia.com/advisories/33178

Trust: 1.7

url:http://secunia.com/advisories/33714

Trust: 1.7

url:http://secunia.com/advisories/33786

Trust: 1.7

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1

Trust: 1.7

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-622-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-627-1

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2019/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2023/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2025/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2029/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2030/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2050/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2051/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2052/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2055/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2092/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2113/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2114/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2123/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2139/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2166/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2195/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2196/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2197/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2268

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2291

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2334

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2342

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2377

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2383

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2384

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2466

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2467

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2482

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2525

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2549

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2558

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2582

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2584

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/0297

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/0311

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/0622

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43637

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43334

Trust: 1.7

url:http://www.ipcop.org/index.php?name=news&file=article&sid=40

Trust: 1.6

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=762152

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=141879471518471&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=123324863916385&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=121866517322103&w=2

Trust: 1.6

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680

Trust: 1.6

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=121630706004256&w=2

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2008-1447

Trust: 1.3

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2008-009.txt.asc

Trust: 1.1

url:http://secunia.com/advisories/26195/

Trust: 0.9

url:http://csrc.nist.gov/publications/nistpubs/800-81/sp800-81.pdf

Trust: 0.8

url:http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience

Trust: 0.8

url:http://tools.ietf.org/html/rfc3833

Trust: 0.8

url:http://tools.ietf.org/html/rfc2827

Trust: 0.8

url:http://tools.ietf.org/html/rfc3704

Trust: 0.8

url:http://tools.ietf.org/html/rfc3013

Trust: 0.8

url:http://tools.ietf.org/html/rfc4033

Trust: 0.8

url:http://tools.ietf.org/html/draft-ietf-tsvwg-port-randomization

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_random.html

Trust: 0.8

url:http://cr.yp.to/djbdns/dns_transmit.html

Trust: 0.8

url:http://cr.yp.to/djbdns/forgery.html

Trust: 0.8

url:http://www.trusteer.com/microsoftdns

Trust: 0.8

url:http://www.trusteer.com/bind9dns

Trust: 0.8

url:http://www.trusteer.com/bind8dns

Trust: 0.8

url:http://www.sans.org/reading_room/whitepapers/dns/1567.php

Trust: 0.8

url:http://blogs.iss.net/archive/morednsnat.html

Trust: 0.8

url:https://jvn.jp/cert/jvnvu800113/

Trust: 0.8

url:http://www.cert.at/static/cert.at-0802-dns-patchanalysis.pdf

Trust: 0.8

url:http://www.isc.org/sw/bind/bind-security.php

Trust: 0.8

url:http://www.trusteer.com/docs/bind9dns.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23252735/index.html

Trust: 0.8

url:http://www.milw0rm.com/exploits/4266

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=307041

Trust: 0.8

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.4

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.4

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.4

url:http://packages.debian.org/<pkg>

Trust: 0.3

url:http://security.debian.org/

Trust: 0.3

url:http://www.debian.org/security/faq

Trust: 0.3

url:http://www.debian.org/security/

Trust: 0.3

url:http://bugs.gentoo.org.

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:http://security.gentoo.org/

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1447

Trust: 0.2

url:http://software.hp.com

Trust: 0.2

url:https://www.hp.com/go/swa

Trust: 0.2

url:http://itrc.hp.com

Trust: 0.2

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&amp;id=762152

Trust: 0.1

url:http://www.ipcop.org/index.php?name=news&amp;file=article&amp;sid=40

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=123324863916385&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=141879471518471&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121866517322103&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=121630706004256&amp;w=2

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.539239

Trust: 0.1

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.452680

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.diff.gz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4194

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200901-03.xml

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4194

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/d/dnsmasq/dnsmasq_2.35-1+etch4.dsc

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/bind-9.4.2-39.2.src.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-chrootenv-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-chrootenv-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://support.novell.com/techcenter/psdb/aa846ea840c9bf29e6974f3b6913e550.html

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-utils-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/bind-9.4.1.p1-12.5.src.rpm

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-devel-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-devel-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-doc-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-doc-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/bind-libs-32bit-9.4.2-39.2.x86_64.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-utils-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/bind-libs-32bit-9.4.1.p1-12.5.x86_64.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://support.novell.com/techcenter/psdb/555065b7278085ce1ce7a6e84b6f07aa.html

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-libs-9.4.2-39.2.i586.rpm

Trust: 0.1

url:http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-libs-9.4.1.p1-12.5.i586.rpm

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2926

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4313

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0025

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-4096

Trust: 0.1

url:https://h20566.www2.hp.com/portal/site/hpsc/patch/home/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4244

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/800113>

Trust: 0.1

url:http://tools.ietf.org/html/rfc3704>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/252735>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/927905>

Trust: 0.1

url:http://tools.ietf.org/html/rfc2827>

Trust: 0.1

url:http://tools.ietf.org/html/rfc3013>

Trust: 0.1

url:http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/484649>

Trust: 0.1

url:http://www.isc.org/sw/bind/bind-security.php>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-190b.html>

Trust: 0.1

url:http://tools.ietf.org/html/rfc3833>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/457875>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0107

Trust: 0.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/documentindex.jsp?contenttype=supportmanual&lang=en&cc=us&docindexid=179111&taskid=101&prodtypeid=12169&prodseriesid=315667

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0086

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1454

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2247

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1435

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0106

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0085

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/summary.mspx

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2248

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=889482fc-5f56-4a38-b838-de776fd4138c&hash=syssxdf&displaylang=en

Trust: 0.1

url:http://secunia.com/product/2536/

Trust: 0.1

url:http://rhn.redhat.com/errata/rhsa-2007-0740.html

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/2535/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/13653/

Trust: 0.1

url:http://secunia.com/product/48/

Trust: 0.1

url:http://rhn.redhat.com

Trust: 0.1

url:http://secunia.com/product/13651/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/4669/

Trust: 0.1

url:http://secunia.com/product/4668/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13652/

Trust: 0.1

url:http://secunia.com/product/1326/

Trust: 0.1

url:http://secunia.com/advisories/26152/

Trust: 0.1

url:http://secunia.com/product/1306/

Trust: 0.1

url:http://secunia.com/product/4670/

Trust: 0.1

url:http://secunia.com/product/2534/

Trust: 0.1

url:http://secunia.com/product/1044/

Trust: 0.1

sources: CERT/CC: VU#800113 // CERT/CC: VU#252735 // VULHUB: VHN-31572 // PACKETSTORM: 74443 // PACKETSTORM: 68412 // PACKETSTORM: 68129 // PACKETSTORM: 70207 // PACKETSTORM: 73732 // PACKETSTORM: 68691 // PACKETSTORM: 68118 // PACKETSTORM: 68878 // PACKETSTORM: 129616 // PACKETSTORM: 68061 // PACKETSTORM: 68037 // PACKETSTORM: 68199 // PACKETSTORM: 96747 // PACKETSTORM: 58035 // CNNVD: CNNVD-200807-129 // NVD: CVE-2008-1447

CREDITS

Dan Kaminsky

Trust: 0.6

sources: CNNVD: CNNVD-200807-129

SOURCES

db:CERT/CCid:VU#800113
db:CERT/CCid:VU#252735
db:VULHUBid:VHN-31572
db:PACKETSTORMid:74443
db:PACKETSTORMid:68412
db:PACKETSTORMid:68129
db:PACKETSTORMid:70207
db:PACKETSTORMid:73732
db:PACKETSTORMid:68691
db:PACKETSTORMid:68118
db:PACKETSTORMid:68878
db:PACKETSTORMid:129616
db:PACKETSTORMid:68061
db:PACKETSTORMid:68037
db:PACKETSTORMid:68199
db:PACKETSTORMid:96747
db:PACKETSTORMid:58035
db:CNNVDid:CNNVD-200807-129
db:NVDid:CVE-2008-1447

LAST UPDATE DATE

2026-02-08T22:06:40.160000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#800113date:2014-04-14T00:00:00
db:CERT/CCid:VU#252735date:2008-08-06T00:00:00
db:VULHUBid:VHN-31572date:2020-03-24T00:00:00
db:CNNVDid:CNNVD-200807-129date:2020-03-25T00:00:00
db:NVDid:CVE-2008-1447date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#800113date:2008-07-08T00:00:00
db:CERT/CCid:VU#252735date:2007-07-27T00:00:00
db:VULHUBid:VHN-31572date:2008-07-08T00:00:00
db:PACKETSTORMid:74443date:2009-01-29T21:47:08
db:PACKETSTORMid:68412date:2008-07-22T18:01:41
db:PACKETSTORMid:68129date:2008-07-11T22:09:49
db:PACKETSTORMid:70207date:2008-09-22T21:37:12
db:PACKETSTORMid:73732date:2009-01-12T19:16:04
db:PACKETSTORMid:68691date:2008-07-31T22:22:45
db:PACKETSTORMid:68118date:2008-07-11T22:04:56
db:PACKETSTORMid:68878date:2008-08-06T21:52:19
db:PACKETSTORMid:129616date:2014-12-17T18:27:29
db:PACKETSTORMid:68061date:2008-07-10T07:07:50
db:PACKETSTORMid:68037date:2008-07-10T06:23:57
db:PACKETSTORMid:68199date:2008-07-15T16:45:48
db:PACKETSTORMid:96747date:2010-12-16T23:46:15
db:PACKETSTORMid:58035date:2007-07-26T04:26:32
db:CNNVDid:CNNVD-200807-129date:2008-07-08T00:00:00
db:NVDid:CVE-2008-1447date:2008-07-08T23:41:00